Current views on whether an asset is a security tends to follow the “Howey Test,” which comes from a 1946 U.S. Supreme Court case. The ruling says a security involves the investment of money in a common enterprise, in which the investor expects profits primarily from others’ efforts. Many speculate that Bitcoin in itself is not an enterprise, however Initial Coin Offerings or ICOs may fall into that category. With many organizations adopting blockchain technologies today, we may begin to see the ICO as needing to register with the SEC from the Howey Test. What this could mean is that tokens or “alt coins” may begin to see heavier regulation than just following KYC and AML (Anti Money Laundering).
What we’ve seen in the past from ransom campaigns is that buying cryptocurrencies has gotten more and more difficult. If I were to ask you to procure 3-5 Bitcoin within 24 hours, could you do it? What steps would you have to take? Depending on where you are, you might NOT be able to simply wire the funds for 3-5 Bitcoin and have it within 24 hours. Because of KYC and AML, you may find that purchasing 3-5 BTC could take you between 5-8 days. In the U.S., Coinbase has limits for new users. Coinbase today will allow instant purchases for customers who have been fully verified and have linked bank accounts (and have purchase habits that justify the limit) to buy up to $25,000 per week. New customers may not purchase on day one. Here in India, some organizations have basic verification limits of 2 Crore Rupees per day, or 10 Crore Rupees per month in Bitcoin buying. Bitcoin is 5 Crore Rupees right now. So, if you think of these limits, and the verification processes, you may NOT be able to purchase enough Bitcoin to pay a ransom.
So, with that, you may have to ask: When Uber lost 57 million passengers’ data and silently paid, did Uber pay $100,000 in Bitcoin? The answer could be that they would have had to stockpile Bitcoin in the event that they needed to pay the ransom. Research studies have been published that 33% of organizations are stockpiling bitcoin to pay ransoms. Two years ago, Radware’s Emergency Response Team Report found 7% of organizations were stockpiling cryptocurrencies to pay for ransoms.
One of the difficulties that WannaCry had last year was customer service. Because of the size and magnitude of infection of WannaCry, it was considered a large failure for the hackers to monetize because of the difficulty of buying cryptocurrencies. This could also be a large factor in the increase of companies buying and stockpiling cryptocurrencies to pay ransoms.
A month after WannaCry, the same vulnerability was exploited in Linux-based computers running un-patched Samba services. This new exploit based on WannaCry was called Eternal Miner. It was designed to NOT encrypt the hard drive and send a ransom note. Instead, it just made the machines mine a more anonymous cryptocurrency known as Monero. This simplified the process of monetization and eliminated the need to do customer support in teaching the victims how to buy cryptocurrency and send it to the criminals. Since then, we have seen over 500,000 unpatched Windows computers joined onto the Smominru botnet which has earned the hackers over $3.6 Million USD. So, using the same vulnerability to fumble out $170,000 turns to $3.6 million when the tactic changes to cut out the end user here.
Now, it’s become very commonplace for the hackers to utilize compute resources today instead of the old-fashioned ransomware virus. We’ve seen the “CoinHive” JavaScript hijack browsers around the world, and some shady ISPs inject this code into data streams to make extra money. This is the change of the landscape from 2017 to 2018. The regulation of bitcoin and crypto-trading has made it much more challenging for hackers to bring their ill-gotten gains back to fiat currency.
Bitcoin’s underpinning blockchain technology was initially designed to record transactions on the public ledger. The digital ledger also stores addresses of the sender and receiver of a payment with the exact time. Investigators have developed databases and tactics to use this data to tackle criminal activities.
Monero, created in 2014, encrypts addresses and produces fake addresses to shroud the sender. Additionally, the cryptocurrency feature can also conceal the amount of the transaction. Hence, providing a safe haven for wrongdoers and regular privacy-minded users alike.
Because of this difference, the hacking and Darknet communities have switched to favoring Monero. With this change, it definitely is going to make tracking criminals much harder in the near future. Law enforcement worldwide will now have to focus more on money laundering. This may be part of the reason why the regulators are looking to track the crypto-exchange activities, as getting record of trade activity is going to be one of the ways to identify criminals. The next couple of years are going to be interesting as we watch these changes in regulation weave into investment platforms and assist law enforcement. The rollercoasters of the markets will probably continue as we see these scenarios play out.
Source : www.radware.com