The United States investigates the ransom software bargain with a crypto bribery
The US Department of Justice is investigating an old employee of DigitalMint, which provides negotiation to the ransom software attacks, for alleged personal gain through hackers and crypto payments. The company announced that the employee was immediately terminated and that they were in full cooperation with the authorities in the investigation.
Shock investigation from the USA: Did the ransom software interviewer bribe with crypto money?
The US Department of Justice launched a criminal investigation against an ex -employee offering negotiating services against ransom software attacks. Within the scope of the investigation, it is claimed that this person has received commissions from crypto currencies from the victims by cooperating with cyber attackers.
🔍 Details of the investigation
Marc Grens, the president of DigitalMint, a Chicago -based cyber security company, confirmed that an employee was dismissed because of his “unauthorized activities ::
“When the accusations of the employee arise, we immediately ended his duty. DigitalMint is not a target in this investigation and is in full cooperation with security units.”
Grens emphasized that the company has taken a quick action to protect its customers and that the necessary information has been sent to all relevant stakeholders.
🛡️ Who is DigitalMint?
DigitalMint is a company that provides technical support and secure payment infrastructure in the processes of payment to companies and hackers who are exposed to ransom software attacks.
Fortune 500 companies include customers.
He is registered to the US Financial Crimes Research Network (Fincen).
📉 Decrease trend in ransom payments
The rate of companies that prefer to pay after cyber attacks is gradually decreasing. According to Coveware’s report of cyber event intervention company:
In the last quarter of 2024, only 25 %paid the ransom.
This rate was 85 %in the first quarter of 2019.
The reason for the fall; In addition to developing cyber safety infrastructure and backup strategies, regulation pressure and increased legal sanctions.
New sanctions from the USA
This week, the US Treasury Ministry targeted Russian -based Aeza Group and its executives.
Aeza is allegedly home to ransom software and data playing software.
A crypto wallet linked to the group was also included in the sanction list.
⚠️ Attention to Ransomware negotiators!
James Talianto, CEO of Cyber Intelligence Company named AphtRRK, said that the negotiations on ransom software do not always act in the interest of the customer:
“If the company receives its earnings according to the size of the payment, the interviewer is not encouraged to lower the ransom or to tell the customer to the customer.”
In addition, according to a 2019 Propublica report, some US -based firms were directly in agreement with hackers and saved the data by directing the data, and then invoicing high fees for its customers.
Ransomware damage in 2024 815 million dollars
According to Chainalysis’s February 2025 report:
In 2024, crypto ransom payments with cyber attacks decreased by 35 %to $ 815 million.
In 2023, this figure was $ 1.25 billion.