US links $5.2 billion in Bitcoin transactions to ransomware
A new report from the Treasury ties the cryptocurrency to ransomware payments over a ten year period


The US Treasury has identified approximately $5.2 billion in outgoing Bitcoin transactions likely to be tied to the top 10 most commonly reported ransomware payments over a ten year period.
The Treasury’s Crimes Enforcement Network (FinCEN) identified and analysed 177 convertible virtual currency (CVC) wallet addresses used for ransomware-related payments by analysing 2,184 Suspicious Activity Reports (SARs) filed between 1 January 2011 and 30 June 2021, it said in a report.
Based on blockchain analysis of transactions with the 177 CVC wallet addresses, FinCEN identified around $5.2 billion in outgoing Bitcoin transactions that may have been tied to ransomware payments.
Linking the transactions to this year, FinCen found that between 1 January and 30 June 2021, the number of ransomware-related SARs filed monthly has grown rapidly, with 635 SARs filed and 458 transactions reported during the first half of the year. This is a 30% increase from the total 487 SARs filed for the entire 2020 year. For the first six months of this year, the total value of suspicious activity reported was $590 million, exceeding the $416 million reported the previous year.
“FinCEN analysis of ransomware-related SARs filed during the first half of 2021 indicates that ransomware is an increasing threat to the US financial sector, businesses, and the public,” said the report.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
Although Bitcoin was the most common ransomware-related payment method in reported transactions, FinCEN found the mean average total monthly suspicious amount of ransomware transactions was $66.4 million and the median average was $45 million.
It identified 68 ransomware variants reported in SAR data for transactions, with the most commonly reported being REvil/Sodinokibi, Conti, DarkSide, Avaddon, and Phobos. It also found a number of money laundering typologies common among the variants, including threat actors requesting money in Anonymity-enhanced Cryptocurrencies (AECs) and avoiding reusing wallet addresses, “chain hopping” and cashing out at centralised exchanges, and using mixing services and decentralised exchanges to convert proceeds.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
This comes after the US Department of the Treasury imposed sanctions on a virtual currency exchange in September over its alleged role in facilitating financial transactions for ransomware actors. Suex, the exchange, had allegedly facilitated transactions involving proceeds from at least eight ransomware variants.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
LaunchDarkly to "double down" on observability with Highlight acquisition
News Highlight's observability tools will be integrated into LaunchDarkly's Guarded Releases software deployment service
By Daniel Todd
-
Samsung Galaxy Tab S10 FE review
Reviews The Tab S10 FE retains the feel and core capabilities of Samsung's high-end S10 tablets, but compromises on the display and the performance
By Stuart Andrews
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
By Nicole Kobie
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz