• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, Network Security

6 Money Laundering Typologies Attributed to Ransomware

The U.S. Treasury’s Crimes Enforcement Network (FInCEN) has identified six money laundering typologies related to ransomware payments.

October 18, 2021 Alyssa Borelli Leave a Comment

cryptocurrency NCET
BBbirdZ/stock.adobe.com

As ransomware continues to be an increasing threat to the US financial sector, businesses, and the public, the U.S. Treasury’s Crimes Enforcement Network (FInCEN) has identified six money laundering typologies related to ransomware payments:

1. Threat Actors Increasing Request Payments in AECs

Ransomware-related payments are initially requested in Bitcoin, however threat actors may also ask for requests for Anonymity-Enhanced Cryptocurrencies (aka privacy coins) like Monero, which are secure/anonymous and private transactions between two different parties. These types of payments are hard to trace.

2. Threat Actors Avoided Using Wallet Addresses

Threat acts are also laundering payments from each ransomware event separately by not reusing the same wallet addresses after each attack.

Related: Report: $590 Million Suspicious Ransomware Payments Over First Half Of 2021

3. Centralized CVC Exchanges are Preferred Cash-Out Points

Threat actors are using foreign centralized exchanges for ransomware related deposits, including exchanges incorporated in high-risk jurisdictions that may have opaque ownership structures or that may have inadequate anti-money laundering and countering the financing of terrorism compliance standards.

4. Chain Hopping

Other money laundering tactics include “chain hopping,” a way for actors to disguise the origins of their funds by converting Bitcoin to an AEC.  They can then transfer the converted funds to large CVC services and MSBs with lax compliance programs.

5. Mixing Services

FinCEN observed an increased use of mixing services in its suspicious activity reports. “Mixers are websites or software designed to conceal or obfuscate the source or owner of CVC. Mixers may have obligations as money transmitters under the BSA. Mixing is done either as a general privacy measure or for covering up the movement of funds obtained from theft, darknet markets, or other illicit sources,” according to FinCEN.

6. Decentralized Exchanges Likely Used to Convert Illicit Proceeds

FinCEN notes “ransomware-related payments are being converted to other types of CVCs through decentralized exchanges or other DeFi applications. Some DeFi applications allow for automated peer-topeer transactions without the need for an account or custodial relationship. FinCEN analysis of transactions on the BTC blockchain identified ransomware-related funds sent indirectly to addresses associated with open protocols for use on DeFi applications.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: money laundering, ransom payment, ransomware, U.S. Treasury’s Crimes Enforcement Network

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • White House AI Regulations, ChatGPT, Generative AI 5 Things You Need to Know About the…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.