Follow

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use
Subscribe

DOJ Says Ransomware Gangs Used $1.2B in Crypto to Fund Global Operations

DOJ Says Ransomware Gangs Used $1.2B in Crypto to Fund Global Operations DOJ Says Ransomware Gangs Used $1.2B in Crypto to Fund Global Operations
DOJ Says Ransomware Gangs Used $1.2B in Crypto to Fund Global Operations

Ransomware used to function similarly to digital pickpocketing: it was quick, elusive, and had a low yield. However, in recent years, it has grown into a huge economy of extortion. The U.S. Department of Justice claims that in 2021 alone, these cyber gangs used over $1.2 billion in cryptocurrency to fund their worldwide operations, a statistic that drastically changed our understanding of financial risk on the internet.

The number not only increased, but also skyrocketed. According to reports filed by U.S. financial institutions, crypto-based ransomware payouts are a serious and growing threat, and the total for 2021 was 188% higher than the year before. Bitcoin and its anonymous cousins made the money move swiftly and covertly, but they were used for strategic criminal liquidity rather than speculation.

ItemDetail
Total Crypto Used$1.2 billion in ransomware-related crypto payments in 2021
Key CryptocurrenciesBitcoin, Ethereum, and anonymizing tools like mixers
Leading OriginsApprox. 75% of attacks linked to Russian actors or affiliates
Primary TargetsHealthcare systems, schools, government services
DOJ Enforcement Action2025: Seizure of $1M+ from BlackSuit ransomware group
Ransomware TrendSpike in 2021, dip in 2022, resurgence past $1B again in 2023
Sourcejustice.gov

Ransomware attackers have significantly simplified their operations by utilizing the architecture of crypto, transmitting payments via decentralized networks and anonymizing platforms such as mixers. These tools are not intrinsically illegal, but they have become very useful for people who want to hide their origin, ownership, and destination.

The model of ransomware has also evolved. Gangs nowadays resemble decentralized franchises more than lone hackers. Many use Ransomware-as-a-Service (RaaS) platforms to operate, charging affiliates to execute their malware. Just as a franchisor receives royalties, the core operators also receive a cut. The business model of cybercrime has undergone a particularly inventive change, becoming scalable, effective, and efficient.

This model reduces the entry barrier for early-stage offenders. They only need to negotiate payments and incite fear; they don’t need to manage infrastructure or write code. The effect as a whole has been substantial. These gangs deliberately target government systems, hospitals, and schools that can least afford to be unavailable because they know that desperation frequently results in compliance.

Almost three out of every four ransomware incidents during this spike were connected to Russian-based or affiliated actors. These operations, whether state-tolerated or state-ignored, have significantly taken advantage of jurisdictional barriers. It takes diplomatic teeth to prosecute them, and those teeth are frequently blunt.

Enforcement has, however, become more coordinated and targeted. The DOJ shut down related infrastructure, including servers and communication channels, in 2025 after seizing more than $1 million in cryptocurrency from the BlackSuit ransomware group. Although it was not likely to completely halt operations, the strike was remarkably successful and sent a clear message.

I was sitting in a cafe with an awkwardly folded newspaper next to a laptop when I read about the BlackSuit case. Because it felt so normal, rather than because of the money, the moment stuck. Headlines that used to cause national alarm have become too commonplace.

Many ransomware incidents go unreported or are quietly resolved, which is an uncomfortable reality. Because they are afraid of further disruption or harm to their reputation, victims—especially midsize institutions—often pay in silence. Regulators advise against paying, but the pressures of the moment frequently take precedence over moral or legal objections.

Ransomware increased once more in 2023, despite a brief decrease in 2022. Extortion tactics were becoming more inventive, according to analysts. With the “proof of decryption,” some gangs now unlock a sample file before requesting the entire amount. Others run easy-to-use portals where victims can communicate with support staff and even engage in negotiations.

Law enforcement has begun to spot trends and take down nodes in these ecosystems by incorporating blockchain tracing. However, the work is slow. In contrast to tracking fiat money through banks, tracking cryptocurrency frequently resembles chasing shadows in a mirror maze. It is still very challenging to match a digital wallet to a human identity, even in situations where blockchain trails are decryptable.

It frequently takes international cooperation, search warrants, and subpoenas to obtain a single name. And that trail often ends in silence when the offenders operate in nations that reject or deliberately disregard legal requests from the United States.

Enforcement organizations are still adjusting. The popular cryptocurrency mixer Tornado Cash was sanctioned in 2022, which significantly decreased obfuscation volume by more than 60%. Additionally, the cost of laundering increased dramatically. That minor change has already affected behavior. These days, criminals are being forced to use platforms that are only slightly more traceable, which exposes them to new vulnerabilities.

According to scholarly research, such as a University of Texas report from 2025, anti-money laundering regulations pertaining to cryptocurrencies are starting to show results. Tether was frozen at over $1.3 billion. More significantly, the regulations have thrown off movement patterns, forcing illicit activity into progressively more constrained spaces. That restriction causes friction even though it isn’t a complete blockade. And friction can be especially helpful in these areas.

Regulators face the difficulty of exerting pressure without impeding lawful innovation. Anonymity tools aren’t always designed with crime in mind. Many are intended to encourage financial inclusion or safeguard users under repressive governments. A line must be drawn by policy with care, clarity, and credibility.

It’s encouraging that attitudes regarding crypto enforcement have changed. The days of outright fear and prohibitions are over. Targeting actors, platforms, and actions that clearly facilitate harm is crucial. It involves creating an infrastructure where accountability is ingrained in both culture and code.

There is more to the DOJ’s $1.2 billion disclosure than just statistics. It is a turn. It demonstrates that cybercrime is more than just an IT issue; it is a macroeconomic problem that is supported by liquidity and made acceptable by silence.

The question of how serious this problem is is no longer relevant. It’s our level of readiness to react.

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use