Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

Is bitcoin really digital gold? It’s failed to answer that question

December 6, 2025

Banks paid $370M in ransoms to cybercriminals in 2024

December 6, 2025

Does Your FEHB Premium Change in Retirement?

December 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Smart SpendingSmart Spending
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
Smart SpendingSmart Spending
Home»Banking»Banks paid $370M in ransoms to cybercriminals in 2024
Banking

Banks paid $370M in ransoms to cybercriminals in 2024

December 6, 2025No Comments5 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
Banks paid 0M in ransoms to cybercriminals in 2024
Share
Facebook Twitter LinkedIn Pinterest Email

  • Key insight: Financial institutions paid more in ransom to cybercriminals than any other sector, accounting for $365.6 million across 432 incidents.
  • What’s at stake: Banks navigate a “dual reality” as both prime targets for extortion and the government’s primary tripwire for detecting illicit payments.
  • Supporting data: Bitcoin remains the overwhelming currency of choice for extortionists, accounting for 97% of reported ransomware transactions.

Overview bullets generated by AI with editorial review

Ransomware payments reached approximately $1.1 billion in 2023 before retreating significantly to $734 million in 2024, following high-profile law enforcement disruptions of cybercriminal activity.

In a report released this week, the Financial Crimes Enforcement Network revealed that financial institutions filed over 7,000 suspicious activity reports related to ransomware incidents occurring between January 2022 and December 2024.

Fincen attributes the decline in extortion payments in part to successful federal and international law enforcement disruptions of major ransomware groups, including ALPHV (also known as BlackCat) and LockBit.

Despite disruptions, Fincen noted that ALPHV was the most impactful ransomware during the two-year review period, generating $395.3 million in payments.

A bank reports a ransomware payment to the Treasury Department when it knows or suspects such a payment is related to ransomware. Although aggregate payments declined, the total number of such reports remained relatively flat from 2023 to 2024, hovering around 1,500 annually.

For the banking sector, the data presents a stark dual reality: Banks serve as the primary tripwire for detecting both ransomware payments and money laundering that follows these payments, but they are also top-tier targets for ransomware gangs.

See also  The CFPB has a new tool to examine customer service at banks

With median ransom payments fluctuating between $124,000 and $175,000 over the last three years, and demands often reaching into the millions, the financial stakes for banks — both as gatekeepers and victims — remain high.

During the two-year period Fincen analyzed (January 2022 to December 2024), the manufacturing sector experienced the highest volume of individual incidents (456). However, the financial services sector paid the most to cybercriminals.

Financial institutions accounted for approximately $365.6 million in total payments across 432 reported incidents during the review period, surpassing health care and manufacturing.

Not all ransomware incidents become public knowledge. Paying the extortion fee during a ransomware incident can help a company prevent the stolen data from becoming public, though this requires the cybercriminals to maintain their promise.

However, the FBI discourages ransomware victims from making such payments, as they help to fund and incentivize the illegal activity.

The U.K. National Crime Agency has also warned it has found LockBit retaining data belonging to victims who had paid a ransom to the threat actors. The agency has used these findings to argue that, “even when a ransom is paid, it does not guarantee that data will be deleted, despite what the criminals have promised.”

Indeed, not all ransomware victims make extortion payments. In one highly visible case this year, LockBit stole data from Evolve Bank & Trust, causing downstream impacts on the bank’s many fintech partners, including Affirm and Wise. Evolve said at the time it refused to pay the ransom in the case, leading LockBit to leak the stolen data.

See also  Trump's fintech effect, VyStar CFPB woes and more tech news

Compliance obligations and red flags

For anti-money-laundering and Bank Secrecy Act officers, the Fincen report this week also underscores the necessity of precise reporting.

Fincen advises that financial institutions should include the key term “CYBER-FIN-2021-A004” in suspicious activity reports to flag a connection to ransomware.

Furthermore, the agency urged compliance teams to include so-called “Indicators of Compromise” directly in the BSA reporting form. These include suspicious email addresses, file names, hashes, domains and IP addresses. Indicators of compromise often help other companies detect similar intrusions.

When monitoring transaction flows, bankers should note that bitcoin remains the overwhelming currency of choice for extortionists. Bitcoin accounted for 97% of reported ransomware transactions, according to Fincen, while privacy coins such as Monero appeared in only 2% of reports.

Additionally, threat actors continue to launder their ransomware proceeds primarily through unhosted crypto wallets, which are digital wallets that owners manage directly rather than managing through, say, a cryptocurrency exchange.

Some of these findings could be skewed by underreporting due to difficulties with monitoring for and identifying such transactions, Fincen warned.

“The data in this report consists only of information received through BSA reporting and is not a complete representation of all ransomware attacks or payments during the review period,” the report reads.

Scrutiny over ransomware payments

Although federal prosecutors generally do not target companies that pay ransomware payments, and the practice is generally regarded as legal in some circumstances, it is under intensifying scrutiny.

The U.K. Home Office is currently consulting on legislative proposals that could ban ransomware payments for all public sector bodies and critical national infrastructure providers. While the effort is currently limited to the U.K., it signals a potential shift in the global regulatory landscape that multinational banks must monitor.

See also  Banks navigate workers' use of ChatGPT, set AI policies

Bankers in the U.S. must also remain vigilant regarding strict liability for sanctions violations. Fincen advised institutions to contact the Office of Foreign Assets Control immediately if there is any reason to suspect a cyber actor demanding payment is a sanctioned entity.

“We will continue to work closely alongside our partners, across the U.S. government and around the world to disrupt cybercrime operations … and to find and hold accountable those responsible for them,” Attorney General Merrick Garland said in a May 2024 press release regarding charges against the LockBit administrator.

For the time being, banks are encouraged to continue reporting ransomware payments made either by the bank itself or by its customers.

Andrea Gacki, the director of Fincen, said financial institutions “play a key role in protecting our economy from ransomware and other cyber threats.”

“By quickly reporting suspicious activity under the Bank Secrecy Act, they provide law enforcement with critical information to help detect cybersecurity trends that can damage our economy,” Gacki said.

Source link

370M Banks cybercriminals paid ransoms
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous ArticleDoes Your FEHB Premium Change in Retirement?
Next Article Is bitcoin really digital gold? It’s failed to answer that question

Related Posts

Connecting banks with nonprofits to make New York ‘greater’

December 6, 2025

CFPB’s proposed credit access rule would bring redlining back

December 5, 2025

OCC, FDIC scrap 2013 post-crisis leveraged-loan guidance

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

FOMC minutes reveal disagreement on possible tariff impacts

May 28, 2025

These Big Banks Offer High CD APYs

October 28, 2024

I Bond Rate Falls to 4.3% Amid Cooling Inflation

April 10, 2025
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

Is bitcoin really digital gold? It’s failed to answer that question

December 6, 2025

Banks paid $370M in ransoms to cybercriminals in 2024

December 6, 2025

Does Your FEHB Premium Change in Retirement?

December 6, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 Smartspending.ai - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.