Home Technology Top Stories Business Most Featured Sports Social Issues Animals News Fashion Crypto Featured Music & Pop Culture Travel & Tourism

No More Ransoms for Cybercriminals; 40 Countries Join US-led Alliance

Author Avatar
By Jessy Sloan - - 5 Mins Read
Hacker in dark hoody: US flag background
Photo | Shutterstock

An initiative involving 40 nations around the world, led by the United States, aims to address the growing threat of ransom cybersecurity attacks.


The International Counter-Ransomware Initiative seeks to eliminate the funding mechanisms of hackers responsible for these attacks.


Thus, with the vast majority of ransomware incidents occurring in the United States, urgent action is needed to counter this pervasive cybercrime.


The Escalating Threat of Ransom Cybersecurity Attacks


The International Counter Ransomware Initiative, comprising 40 countries led by the United States, is poised to combat the escalating threat posed by ransom cybersecurity attacks.


Meanwhile, with ransomware incidents predominantly targeting the United States, urgent measures are required to curtail this growing menace.


In a recent virtual briefing, Anne Neuberger, U.S. Deputy National Security Adviser for Cyber and Emerging Technologies, emphasized the need to address the root cause of ransomware attacks.

Anne Neuberger, U.S. Deputy National Security Adviser for Cyber and Emerging Technologies
Anne Neuberger, U.S. Deputy National Security Adviser for Cyber and Emerging Technologies | VotMedia/YT


"As long as there is money flowing to ransomware criminals, this is a problem that will continue to grow," she told reporters during a virtual briefing.


Additionally, the International Counter-Ransomware Initiative aims to eradicate the financial support of these cybercriminals and minimize the harm they cause. Anne Neuberger further stated that artificial intelligence will be employed to identify and verify blockchain transactions that could be involved in illegal activities.


Collaboration and Information Sharing to Cripple Hackers' Funding


The initiative centers around enhanced collaboration and information sharing among partner countries.


By leveraging the expertise of each nation, a comprehensive effort to identify digital wallets used for ransom payments will be coordinated.


Moreover, two dedicated information-sharing platforms, established by Lithuania and a joint effort by Israel and the UAE, will serve as critical tools in disrupting these criminal networks, which is a good idea.


Thus, partner countries will actively contribute to a "black list" of ransom payment accounts through the U.S. Department of Treasury.


By constantly updating this list, the initiative aims to hinder the movement of ransomware payments and expose illicit activities.


However, leveraging artificial intelligence and advanced blockchain analysis, efforts will be made to trace and track illegal funds associated with ransomware attacks. With this idea, it will be way safer and easier.


According to blockchain analytics firm "Chainalysis", the volume of crypto payments to ransomware attackers is on track to reach its second-highest annual total ever recorded.


This alarming trend underscores the urgent need for global cooperation in combating ransomware. Ransomware attacks have emerged as one of the most formidable cybersecurity challenges organisations worldwide face, capable of encrypting files and disrupting entire networks.


The repercussions of such attacks can be devastating, with businesses of all scales encountering the crippling effects of inaccessible, encrypted data.


Meanwhile, victims are often coerced into paying a ransom to regain control of their networks, while others resort to the painstaking process of restoring data from backups.


In more audacious instances, cybercriminals publicly expose stolen data as a tactic to pressure victims into compliance.


Although ransomware attacks have garnered widespread attention in recent years, their origins trace back to 1989 with the emergence of the AIDS or PC Cyborg Trojan.


This early ransomware variant operated by encrypting the victim's machines and demanding ransom payments for data decryption.


The evolution of ransomware from these humble beginnings into today's highly sophisticated attacks highlights the need for comprehensive measures to combat this pervasive threat.