Ransomware, malicious software that encrypts computers and keeps them âlockedâ until a ransom is paid, is the worldâs fastest-growing cyber threat, according to Coinfirm. Recent attacks on critical national infrastructure, like the Colonial Pipeline incursion that crippled oil and gas deliveries for a week along the U.S. East Coast, have set off alarms. Ransom payments are almost always made in Bitcoin or other cryptocurrencies.Â
But while many were shaken by Mayâs Colonial Pipeline attack â the Biden administration issued new pipeline regulations in its aftermath â relatively few are aware of that dramaâs final act: Using blockchain analysis, the FBI was was able to follow the ransom payments fund flow and recover about 85% of the Bitcoin paid to ransomware group DarkSide.Â
In fact, blockchain analysis, which can be further enhanced with machine learning algorithms, is a promising new technique in the battle against ransomware. It takes some of cryptoâs core attributes â e.g., decentralization and transparency â and uses those properties against malware miscreants.Â
While cryptoâs detractors tend to emphasize its pseudonymity â and attractiveness to criminal elements for that reason â they tend to overlook the relative visibility of BTC transactions. The Bitcoin ledger is updated and distributed to tens of thousands of computers globally in real time each day, and its transactions are there for all to see. By analyzing flows, forensic specialists can often identify suspicious activity. This could prove to be the Achillesâ heel of the ransomware racket.
An underused means
âThe blockchain ledger on which Bitcoin transactions are recorded is an underutilized forensic tool that can be used by law enforcement agencies and others to identify and disrupt illicit activities,â Michael Morrell, former acting director of the U.S. Central Intelligence Agency, declared in a recent blog, adding:
âPut simply, blockchain analysis is a highly effective crime fighting and intelligence gathering tool.[âŚ] One expert on the cryptocurrency ecosystem called blockchain technology a âboon for surveillance.ââÂ
Along these lines, three Columbia University researchers recently published a paper, âIdentifying Ransomware Actors in the Bitcoin Network,â describing how they were able to use graph machine learning algorithms and blockchain analysis to identify ransomware attackers with â85% prediction accuracy on the test data set.â
Those on the frontlines of the ransomware struggle see promise in blockchain analysis. âWhile it may at first seem like cryptocurrency enables ransomware, cryptocurrency is actually instrumental in fighting it,â Gurvais Grigg, global public sector chief technology officer at Chainalysis, tells Magazine, adding:
âWith the right tools, law enforcement can follow the money on the blockchain to better understand and disrupt the organizationâs operations and supply chain. This is a proven successful approach as we saw in Januaryâs âtakedownâ of the NetWalker ransomware strain.â
Whether blockchain analysis alone is enough to thwart ransomware incursions or whether it needs to be joined with other tactics, like bringing political/economic pressure to bear on foreign countries that tolerate ransomware groups, is another question.
Unmasking criminals?
Clifford Neuman, associate professor of computer science practice at the University of Southern California, believes that blockchain analysis is an underutilized forensic tool. âMany people, including criminals, assume Bitcoin is anonymous. In fact, it is far from being so in that the flow of funds is more visible on the âpublicâ blockchain than it is in almost any other kinds of transactions.â He adds: âThe trick is to tie the endpoints to individuals, and blockchain analysis tools can sometimes be used to do this linking.â
A valid means for unmasking ransomware attackers? âYes, absolutely,â Dave Jevans, CEO of crypto intelligence firm CipherTrace, tells Magazine. âUsing effective blockchain analytics, cryptocurrency intelligence softwareâ â the sort his firm produces â âto track where ransomware actors are moving their funds can lead investigators to their true identities as they attempt to off-ramp their crypto to fiat.âÂ
Â
Â
Â
Â
David Carlisle, director of policy and regulatory affairs at analytics firm Elliptic, tells Magazine: âBlockchain analysis is already a proven valuable technique for enabling law enforcement to disrupt the activities of these networks, as the Colonial Pipeline case made clear.â
Within days of the May 8 ransom payment by Colonial Pipeline, Elliptic was able to identify the Bitcoin wallet that received the payment. Further, âIt [the wallet] had received Bitcoin payments since March totaling $17.5 million,â recounts law firm Kelley Drye & Warren LLP. Elliptic was helped by the fact that the malefactors had used no âmixersâ to further obscure their trail. Carlisle adds:Â
âThe underlying transparency of Bitcoin and other crypto assets means that law enforcement can often glean a level of insight into money laundering activity that would not be possible with fiat currencies.â
A boost from machine learning?
Machine learning (ML) is one of those emerging technologies, like blockchain, for which novel use cases seem to be discovered weekly. Can ML assist too in the war against ransomware?
âAbsolutely,â Allan Liska, a senior intelligence analyst at Recorded Future, tells Magazine, adding further: âGiven the large number of malicious transactions occurring at any given time and the increasing sophistication of some ransomware groups, money laundering capabilities manual analysis has become less effective â and machine learning is required to effectively track tell-tale signs of malicious transactions.â
âMachine Learning is very promising in fighting crimes,â Roman Bieda, head of fraud investigations at Coinfirm, informs Magazine, but it requires a huge amount of data to be effective. It is relatively easy to acquire Bitcoin addresses, which are available in the millions, but a dataset upon which a learning model can be trained and tested also requires a certain number of âfraudulentâ Bitcoin addresses â i.e., confirmed ransomware actors. âOtherwise, the model will either mark a lot of false positives or will omit the fraudulent data as a minor percentage,â says Bieda.
Say you want to build a model that will pull out photos of dogs from a trove of cat photos, but you have a training dataset with 1,000 cat photos and only one dog photo. An ML model âwould learn that it is okay to treat all photos as cat photos as the error margin is [only] 0.001,â notes Bieda. In other words., the algorithm would just guess âcatâ all the time, which would render the model useless, of course, even as it scored high in overall accuracy. Â
Â
Â
Â
In the Columbia University study, researchers made use of 400 million Bitcoin transactions and close to 40 million Bitcoin addresses, but only 143 of these were confirmed ransomware addresses.Â
âWe show that very local subgraphs of the known such actors are sufficient to differentiate between ransomware, random and gambling actors with 85% prediction accuracy on the test data set,â reported the authors, adding that âFurther improvement should be possible by improving clustering algorithms.âÂ
They added, however, that âGetting more data which is more reliable would improve accuracy,â making the model more âsensitiveâ and avoiding the sort of problem described above by Bieda, presumably.Â
Along these lines, the United States Department of Homeland Security issued a directive in the wake of the Colonial Pipeline attack requiring pipeline companies to report cyberattacks. Reporting attacks had been optional before. Mandates like these will arguably help to build out a public dataset of âfraudulentâ addresses needed for effective blockchain analysis. Adds Carlisle: âPublic-private partnerships need to focus on sharing financial intelligence related to ransomware attacks.â
Much blockchain analysis is premised on the notion that attackers can be unmasked after an attack takes place. But law enforcement agencies, and especially ransomware victims, would prefer that assaults not happen in the first place. According to Jevans, blockchain analysis can also enable enforcement agencies to act preemptively. He tells Magazine:
âWhile blockchain clustering algorithms typically require someone to make a payment into an address in order to track the funds and identify the owner, advanced tools like CipherTrace can produce actionable intelligence on addresses that have yet to receive funds, as well, such as IP data that can assist investigators.â
Necessary but not sufficient?
Some ask, however, whether blockchain analysis by itself is sufficient to eliminate ransomware. âBlockchain analysis is an important tool in law enforcementâs toolkit, but there is no single silver bullet for solving the ransomware problem,â says Grigg.Â
Liska adds: âEven the best research and identification tools arenât effective unless governments are willing to take access. Stopping ransomware transactions is going to require cooperation between private entities and governments.â
Many ransomware attacks originate on the borders of Russia, according to Coinfirm, so some ask if Vladimir Putin can be pressured to shut down those groupsâ operations. âPast cases show not much can be done against the countries related to the cyberattacks, even if there are very strong indicators that the hackers are related to the secret services,â Bieda tells Magazine.Â
Â
Â
Â
Â
Others question whether blockchain analysis can make any dent at all in the malware problem. âIt is way too soon to write off cryptocurrency as a vehicle for ransomware,â Edward Cartwright, professor of economics at De Montfort University, tells Magazine. âWhile there have been a few âgood newsâ stories of late, the reality is that ransomware criminals are still routinely using Bitcoin as the easiest and most anonymous way of extracting ransoms.â
Moreover, even if Bitcoin becomes too radioactive for malefactors because of its traceability â âa big if,â in Cartwrightâs view â âcriminals can simply move to currencies that are completely anonymous and untraceable,â like Monero and other privacy coins, he says.
âWe really need to see increased collaboration between the private and public sector to build full profiles of these ransomware groups,â says Jevans. âInformation sharing in these situations can be the silver bullet.âÂ
âOne of the challenges is that ransomware groups are turning to offline methods to move Bitcoin,â says Liska. âLiterally, two people meeting in a parking lot or restaurant with their phones and briefcase full of cash.â These types of transactions are much harder to trace, he tells Magazine, âbut still not impossible with more advanced tracking techniques.â
But will malefactors move to privacy coins?
What about Cartwrightâs point that ransomware actors will simply move to privacy coins like Monero if Bitcoin proves too traceable? Elliptic is already seeing âa significant uptickâ in attempts to obtain payments from ransomware victims in Monero, Carlisle tells Magazine. âThis has really increased since the time of the Colonial Pipeline case, when the implications of Bitcoinâs traceability were on clear display for any other cybercriminals watching.â
But privacy coins can be traced too, though itâs more difficult to do because, unlike Bitcoin, privacy coins hide usersâ addresses and transaction amounts. Some jurisdictions, too, have cracked down on privacy coins, or are thinking of doing so. Japan banned privacy coins in 2018, for instance. But thereâs a practical problem too. Ransomware victims facing a payment deadline often have trouble finding exchanges that will convert their fiat currency into XMR within the required time period to pay their extortionists and unlock their computers, Bieda tells Magazine. Privacy coins arenât nearly as well supported by crypto exchanges as Bitcoin. Jevans says âBitcoin is simply the easiest cryptocurrency to acquire,â adding:
âIt is unlikely that ransomware actors will ever completely stop using Bitcoin because of its liquidity and the accessibility of Bitcoin to fiat off-ramps in comparison to other privacy-enhanced cryptocurrencies.â
Most regulated exchanges do not offer Monero trading, adds Carlisle. âVictims may negotiate with the attackers and persuade them to accept payment in Bitcoin, but attackers will then typically demand a fee of 10%â15% for Bitcoin payments above what they would require for a Monero payment â which reflects their concern that Bitcoinâs traceability leaves them vulnerable.âÂ
Is banning crypto a solution?
Recently, former Federal Reserve Bank of New York Supervisor Lee Reiners suggested in a Wall Street Journal opinion piece that âThere is a simpler and more effective way to stop the ransomware pandemic: Ban cryptocurrency.â After all, he added, âRansomware canât succeed without cryptocurrency.âÂ
âThis sounds like a solution that would be even worse than the problem,â comments Benjamin Sauter, a lawyer at Kobre & Kim LLP. âHowever, it does reflect a perception, particularly among many policy makers in the U.S., that cryptocurrency offers a haven for criminals that needs to be restricted,â he tells Magazine.Â
Â
Â
âThe profitability for the threat actors that are carrying our ransomware attacks would certainly decrease if cryptocurrency did not exist, as laundering fiat is inherently more costly,â Bill Siegel, co-founder and CEO of ransomware recovery firm Coveware, tells Magazine. âThese attacks would still happen though.â
âI do not think it makes sense to ban cryptocurrency,â Neuman adds. âThe existing laws that are on the books in the U.S. require information to be collected on certain kinds of payment instruments for transactions over a certain threshold, and we can apply those rules to cryptocurrency as well. If we ban cryptocurrency, criminals will simply shift their payment demands to other instruments.â
A âcat and mouse gameâ
Moving forward, ransomware groups will have to live with the increasing risk of getting caught by using Bitcoin, says Liska, âor decide if they are willing to accept significantly lower ransom payments to better preserve their anonymity.â Â
This remains âa game of cat and mouse between the criminals and law enforcement,â adds Cartwright, âand recent successes of law enforcement are more because the criminals got sloppy or made mistakes [rather] than a fundamental flaw in the [criminalsâ] business model.â
A global effort may be required to turn the tide on ransomware. All countries need to regulate crypto exchange platforms, says Carlisle, âotherwise attackers will continue to have easy avenues for laundering their proceeds of crime,â while Bieda predicts that crypto will continue to be used for ransom payments âuntil stringent global and regional regulations such as harsh penalties for lackluster KYC are introduced.â
Â
Â
Tracing Colonial Pipeline #bitcoin #ransom to DarkSide to FBI seizure:â¸5/8 Colonial Pipeline pays 75 BTCâ¸5/9 DarkSide affiliate withdraws 63.75 BTCâ¸5/27 63.75 BTC moved to another wallet, private key âwas in the possession of the FBIââ¸6/8 BTC in the wallet seized by FBI pic.twitter.com/RAebpn3P3H
â elliptic (@elliptic) June 10, 2021
Â
Itâs important to put ransomware in context, too. âRansomware is simply the most recent method used by criminals to monetize their exploits,â says Neuman. âAt some point it might cease to be called ransomware, but attacks on computer systems will take other forms.â Adds Sauter: âEveryone would win if there were an industry-based solution.â
In sum, people tend to overestimate Bitcoinâs anonymity and underestimate its transparency. âThere will always be bad actors,â as Jevans notes, but ransomware groups will realize that crypto payments are traceable, leaving them vulnerable and perhaps even inciting them to find other means by which to pursue their perfidious trade.
Meanwhile, âContinued advancements in blockchain analytics will provide investigators with more and even better insights over time,â says Carlisle. And as law enforcement agencies become increasingly adept in their use of these analytic tools, âWe can expect to see more, and bigger, [ransomware] seizures over time.â
Â
Â
Â
Â



