{"id":13066,"date":"2023-09-05T12:26:04","date_gmt":"2023-09-05T02:26:04","guid":{"rendered":"https://insights.namescan.io/?p=13066"},"modified":"2023-09-12T09:57:39","modified_gmt":"2023-09-11T23:57:39","slug":"ransomware-the-fatf-acts-against-cybercrime","status":"publish","type":"post","link":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/","title":{"rendered":"Ransomware: The FATF Acts Against Cybercrime"},"content":{"rendered":"<p><span data-contrast=\"auto\">Ransomware attacks have been on the rise in recent years, with industry estimates reporting a fourfold increase in payments made to cybercriminals in 2020 and 2021 compared to 2019. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">These attacks have had a significant impact on society, causing major disruption and damage to governments, public institutions, businesses, and citizens. In some cases, ransomware attacks have even impacted healthcare systems and threatened national security by stopping critical infrastructure and services or compromising sensitive data. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">As the frequency and severity of ransomware attacks continue to increase, it is crucial to understand their effects on society and how to prevent and mitigate them.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span><span data-contrast=\"auto\">In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a </span><a href=\"https://www.fatf-gafi.org/content/fatf-gafi/en/publications/Methodsandtrends/countering-ransomware-financing.html\"><span>“Countering the Financing of Ransomware” report</span></a><span data-contrast=\"auto\"> that provides guidance for countries to prevent and detect the laundering of proceeds from these attacks. Additionally, it has issued potential risk indicators for </span><a href=\"https://ar.namescan.io/industries/financialinstitution\"><span>financial institutions</span></a><span data-contrast=\"auto\"> and other businesses to help identify and report suspicious activity related to ransomware payments.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h2><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span><span data-contrast=\"none\">What is Ransomware?</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span><span data-contrast=\"auto\">Ransomware is a type of extortion where attackers use a type of malicious software (malware) that criminals use to deny access to data, systems, or networks while demanding a ransom payment in exchange. Attackers commonly employ various methods to deny access to data such as data encryption, data exfiltration, etc. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">What sets ransomware apart from other types of malwares is the threat to publish the victim&#8217;s data if the ransom demand is not met. As such, ransomware attacks can cause significant disruptions, losses, and even reputational damage for businesses, institutions, and individuals alike.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Ransomware Techniques</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">Ransomware techniques have evolved significantly in recent years, with criminals utilising sophisticated methods to access their victims’ systems.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">These techniques often involve:</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Big game hunting</span></b><span data-contrast=\"auto\">: This technique involves targeting large, high-value organisations, often high-profile ones that are more likely to have higher costs of downtime, including critical infrastructure. These organisations are believed to have a higher probability of paying ransoms. Ransomware attackers frequently target energy, banking, communication, and education sectors, but they also target government/public sector entities, healthcare, and industrial goods.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">RAAS</span></b><span data-contrast=\"auto\">: This stands for Ransomware-as-a-Service, which is a business model where ransomware criminals either provide ransomware services on the Dark Web or outsource elements of the attacks, such as distribution of malware, initial compromise of a victim’s network, stolen credentials, and other services in exchange for a fee.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Double extortion</span></b><span data-contrast=\"auto\">: This technique involves an attacker exfiltrating a victim’s data before encrypting it and then threatening to publish the stolen data if ransom is not paid.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Triple extortion</span></b><span data-contrast=\"auto\">: This technique involves an attacker asking for ransom not only from the victim company but also from the victim whose data was disclosed. This might include protected health information, personally identifiable information, account credentials, and intellectual property.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Multiple extortion</span></b><span data-contrast=\"auto\">: This practice involves more than two extortion methods. It may include double-extortion using encryption, but also additional pressure tactics such as distributed denial-of-service (DDoS), contacting victims’ customers, short selling victims’ stocks, and disrupting infrastructure systems.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p><span data-contrast=\"auto\">Ransomware attacks can have severe consequences and pose significant national security threats, including causing damage and disruption to critical infrastructure and essential services.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Countries with Higher Risk of Laundering Ransomware Attacks</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">Ransomware attacks are a </span><a href=\"https://ar.namescan.io/coverage\"><span>global problem</span></a><span data-contrast=\"auto\">, but certain countries are at higher risk of being targeted by these malicious actors to launder the proceeds of their crimes.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">These countries include:</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Countries known for providing funding or support to terrorism activities</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Countries known for having significant levels of organised crime, corruption, drugs, human trafficking, and </span><a href=\"https://ar.namescan.io/industries/sportsracingbetting\"><span>illegal gambling</span></a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Countries subject to sanctions, embargoes, or similar measures</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Countries with weak governance, law enforcement, and regulatory regimes, especially VASPs</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<p aria-level=\"2\"><span data-contrast=\"none\">Geographical Distribution of Ransomware Attacks</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">The distribution of ransomware attacks refers to the geographical spread of these types of attacks. Different regions have different levels of susceptibility to these attacks due to variations in security measures and digital infrastructure. According to the FATF, </span><a href=\"https://ar.namescan.io/coverages/usa\"><span>North America</span></a><span data-contrast=\"auto\"> seems to have the higher ransomware attacks where Middle East and </span><a href=\"https://ar.namescan.io/coverages/southafrica\"><span>Africa</span></a><span data-contrast=\"auto\"> the lowest.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<h2 aria-level=\"2\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-13072\" src=\"https://insights.namescan.io/wp-content/uploads/2023/09/3.png\" alt=\"Ransomware attack by Geography\" width=\"467\" height=\"149\" srcset=\"https://namescan.io/insights/wp-content/uploads/2023/09/3.png 401w, https://namescan.io/insights/wp-content/uploads/2023/09/3-300x96.png 300w\" sizes=\"auto, (max-width: 467px) 100vw, 467px\"></h2>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Methods of Laundering Proceeds from Ransomware Attacks</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">Ransomware attackers often demand payments in </span><a href=\"https://insights.namescan.io/increasing-aml-compliance-obligations-in-the-cryptocurrency-industry/\"><span>virtual assets</span></a><span data-contrast=\"auto\">, making it difficult to trace the illicit proceeds. Criminals employ a range of techniques to launder the virtual assets they receive as payments for ransomware attacks. These methods aim to conceal the origin and movement of the illicit funds, making it difficult for law enforcement authorities to track and seize them and include:</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Peer-to-peer (P2P):</span></b><span data-contrast=\"auto\"> The victim can send virtual assets to the ransomware operator directly with the use of their private key and internet connection without the use of a regulated institution. As a result, the parties of the transaction do not need to go through KYC procedures.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Different wallet addresses:</span></b><span data-contrast=\"auto\"> Ransomware attackers often demand payments in different wallet addresses they control to receive illicit proceeds from each attack.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Use of intermediary addresses:</span></b><span data-contrast=\"auto\"> Once funds are received, the attackers may use multiple intermediary addresses to move the virtual assets by transferring small amounts to new addresses hosted by regulated VASPs (peel chains).</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Use of mixers and tumblers:</span></b><span data-contrast=\"auto\"> These services conceal the connection between the virtual asset sending address and the receiving address.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Privacy coins:</span></b><span data-contrast=\"auto\"> Although most ransomware attackers demand their payments in bitcoins, in some cases they request their payments in privacy coins (anonymity-enhanced cryptocurrencies). These coins obfuscate sending and receiving wallets.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Chain-hopping</span></b><span data-contrast=\"auto\">: Ransomware attackers often move virtual assets from one blockchain to a different blockchain in rapid succession to evade tracking of movements. In some cases, they use DeFi protocols to chain-hop into stablecoins before converting the funds into fiat currency. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">VASPs in high-risk jurisdictions</span></b><span data-contrast=\"auto\">: Often attackers send the virtual assets to a VASP located in jurisdictions with weak or non-existent AML/CTF controls to make the conversion into fiat currency.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Money mules</span></b><span data-contrast=\"auto\">: Often criminals open accounts using a stolen or fake identity or use accounts held by third parties who are recruited for this purpose. These accounts are used to move funds further disguising the source of the virtual assets.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Proposed practices by the FATF in Relation to Ransomware Attacks</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">To effectively combat the increasing threat of ransomware attacks, various practices have been proposed by the FATF for countries to adopt. These measures aim to enhance detection, prevention, and prosecution of ransomware attacks and the laundering of their proceeds by requiring countries to:</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Criminalise ransomware as a predicate offence</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Accelerate the regulation of Virtual Asset Service Providers (VASPs) for AML/CFT purposes and ensure that they comply with the Travel Rule and reporting of suspicious transactions. The limited implementation of the Travel Rule by VASPs presents opportunities for cybercriminals to avoid detection and hinder investigations, as law enforcement relies on this information to identify the parties involved in a transaction</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Enhance detection by providing guidance to regulated entities to detect ransomware and suspicious transactions by sharing trends, guides and red flag indicators but also encourage victims to report ransomware incidents</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ensure that law enforcement investigates, traces and confiscates criminal proceeds</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Establish mechanisms that support public-private sector cooperation</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Improve international cooperation</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Methods for Detecting Ransomware Attacks</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">Often, competent authorities use the following sources of information to collect information about ransomware attack incidents.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"12\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Regulated institutions such as Banks and VASPs (from suspicious transaction reports)</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"12\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Non-regulated sectors (i.e., institutions involved in ransomware and cybercrime) </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"12\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Incident response companies (i.e., digital forensic incidence response companies and law firms)</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<h2 aria-level=\"2\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-13073\" src=\"https://insights.namescan.io/wp-content/uploads/2023/09/Frame-36267.png\" alt=\"Incident Response Company \" width=\"460\" height=\"147\" srcset=\"https://namescan.io/insights/wp-content/uploads/2023/09/Frame-36267.png 401w, https://namescan.io/insights/wp-content/uploads/2023/09/Frame-36267-300x96.png 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\"></h2>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Potential Risk Indicators for Detection of Ransomware </span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">To combat the increasing threat of ransomware attacks and their financing the FATF has developed some risk indicators to aid countries in detection of ransomware attacks. These risk indicators provided by the FATF are based on specific behaviours and transactions that may indicate ransomware activity, and can be used by </span><a href=\"https://ar.namescan.io/industries/financialinstitution\"><span>financial institutions</span></a><span data-contrast=\"auto\">, regulators, and law enforcement to identify and investigate suspicious activity.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><b><span data-contrast=\"auto\">Indicators for Financial Institutions and Payment Systems </span></b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Wire transfers out to ransomware remediation specialists in the cybersecurity consulting and incident response industries.</span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Wire transfers from insurance firms specialising in ransomware cleanup that arrive out of the blue  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Client-reported ransomware incidents and payments  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Client ransomware attacks open-source data  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Large numbers of withdrawals and deposits at a VASP using the same bank account  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Words like &#8220;ransom&#8221;, or the names of known ransomware families appear in the description of the payment.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Funds disbursed to VASPs in countries with a high risk of corruption </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Using VASPs to track ransomware victims who have paid: </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">A third-party&#8217;s request for an incident response or insurance business to purchase virtual assets.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">The customer informs the VASP that they must pay the ransom to purchase virtual assets.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">A user with no prior record of sending or receiving virtual assets sends money outside of normal protocol.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">A customer raises their account limit and transmits the additional funds to another party.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The customer appears worried or agitated about the delay in receiving money.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Payments made to VASPs in high-risk areas; Purchases or transfers of cryptocurrency that increase users&#8217; anonymity  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">When a new customer buys virtual assets, they send their whole account balance to a single location. </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Evidence-based strategies for preventing ransomware: </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">After an initial, sizable exchange of virtual assets, the buyer engages in almost no more transactions in virtual money.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Using blockchain technology, we can trace ransomware through victim wallet addresses.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Instant access to funds following virtual asset conversion</span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Transfer of virtual assets to ransomware-associated wallets  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Using a VASP in a dangerous country  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Sending Virtual Assets to a Music Production Service  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Using a secure connection  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">The verification data is a screenshot or a filename that includes &#8220;WhatsApp image&#8221; or something like.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Syntax of client does not match customer&#8217;s age range  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Data on the customer reveals the presence of a proton mail or similarly discreet email address.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Inconsistent information provided for identification or an effort to create a fake account  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<ul>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The same contact information is used for multiple accounts, and addresses are used interchangeably.  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">An apparently VPN-using customer  </span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:259}\"> </span></li>\n<li data-leveltext=\"•\" data-font=\"Calibri\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">The use of anonymous cryptocurrency transactions</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></li>\n</ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">What the Future Holds</span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"> </span></h2>\n<p><span data-contrast=\"auto\">We can expect to see continued efforts by the FATF and other international organisations to combat the growing threat of ransomware attacks and the laundering of proceeds from these attacks. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">On their side, governments and businesses will need to implement more robust security measures to protect against ransomware attacks and be prepared to respond quickly and effectively if an attack occurs. </span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n<p><span data-contrast=\"auto\">Additionally, we may see increased cooperation and information sharing among countries and law enforcement agencies to identify and track down cybercriminals involved in ransomware attacks. Ultimately, preventing and mitigating ransomware attacks will require a comprehensive and collaborative approach from all stakeholders involved.</span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> </span></p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks have been on the rise in recent years, with industry estimates reporting a fourfold increase in payments made to cybercriminals in 2020 and 2021 compared to 2019.   These attacks have had a significant impact on society, causing major disruption and damage to governments, public institutions, businesses, and citizens. In some cases, ransomware attacks [&hellip;]</p>\n","protected":false},"author":4,"featured_media":13067,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-13066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https://yoast.com/wordpress/plugins/seo/ -->\n<title>Ransomware: The FATF Acts Against Cybercrime - NameScan Insight</title>\n<meta name=\"description\" content=\" In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a report. Find out more!\" />\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" />\n<link rel=\"canonical\" href=\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\" />\n<meta property=\"og:locale\" content=\"en_US\" />\n<meta property=\"og:type\" content=\"article\" />\n<meta property=\"og:title\" content=\"Ransomware: The FATF Acts Against Cybercrime - NameScan Insight\" />\n<meta property=\"og:description\" content=\" In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a report. Find out more!\" />\n<meta property=\"og:url\" content=\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\" />\n<meta property=\"og:site_name\" content=\"NameScan Insight\" />\n<meta property=\"article:publisher\" content=\"https://www.facebook.com/namescan.io/\" />\n<meta property=\"article:published_time\" content=\"2023-09-05T02:26:04+00:00\" />\n<meta property=\"article:modified_time\" content=\"2023-09-11T23:57:39+00:00\" />\n<meta property=\"og:image\" content=\"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg\" />\n\t<meta property=\"og:image:width\" content=\"1920\" />\n\t<meta property=\"og:image:height\" content=\"1920\" />\n\t<meta property=\"og:image:type\" content=\"image/jpeg\" />\n<meta name=\"author\" content=\"Gelareh\" />\n<meta name=\"twitter:card\" content=\"summary_large_image\" />\n<meta name=\"twitter:creator\" content=\"@namescan_io\" />\n<meta name=\"twitter:site\" content=\"@namescan_io\" />\n<meta name=\"twitter:label1\" content=\"Written by\" />\n\t<meta name=\"twitter:data1\" content=\"Gelareh\" />\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" />\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" />\n<script type=\"application/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#article\",\"isPartOf\":{\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\"},\"author\":{\"name\":\"Gelareh\",\"@id\":\"https://namescan.io/insights/#/schema/person/a16c2d663b91785999852342fe2dae88\"},\"headline\":\"Ransomware: The FATF Acts Against Cybercrime\",\"datePublished\":\"2023-09-05T02:26:04+00:00\",\"dateModified\":\"2023-09-11T23:57:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\"},\"wordCount\":1751,\"commentCount\":0,\"publisher\":{\"@id\":\"https://namescan.io/insights/#organization\"},\"image\":{\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage\"},\"thumbnailUrl\":\"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg\",\"articleSection\":[\"Blog Post\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\",\"url\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\",\"name\":\"Ransomware: The FATF Acts Against Cybercrime - NameScan Insight\",\"isPartOf\":{\"@id\":\"https://namescan.io/insights/#website\"},\"primaryImageOfPage\":{\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage\"},\"image\":{\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage\"},\"thumbnailUrl\":\"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg\",\"datePublished\":\"2023-09-05T02:26:04+00:00\",\"dateModified\":\"2023-09-11T23:57:39+00:00\",\"description\":\" In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a report. Find out more!\",\"breadcrumb\":{\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage\",\"url\":\"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg\",\"contentUrl\":\"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg\",\"width\":1920,\"height\":1920,\"caption\":\"Ransomware attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https://namescan.io/insights/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: The FATF Acts Against Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://namescan.io/insights/#website\",\"url\":\"https://namescan.io/insights/\",\"name\":\"NameScan\",\"description\":\"AML Risk Management and Compliance\",\"publisher\":{\"@id\":\"https://namescan.io/insights/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://namescan.io/insights/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https://namescan.io/insights/#organization\",\"name\":\"NameScan\",\"url\":\"https://namescan.io/insights/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://namescan.io/insights/#/schema/logo/image/\",\"url\":\"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png\",\"contentUrl\":\"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png\",\"width\":300,\"height\":100,\"caption\":\"NameScan\"},\"image\":{\"@id\":\"https://namescan.io/insights/#/schema/logo/image/\"},\"sameAs\":[\"https://www.facebook.com/namescan.io/\",\"https://x.com/namescan_io\",\"https://au.linkedin.com/company/namescan.io\",\"https://www.youtube.com/channel/UCDMcXDG7Z965embyyEkWFLA\"]},{\"@type\":\"Person\",\"@id\":\"https://namescan.io/insights/#/schema/person/a16c2d663b91785999852342fe2dae88\",\"name\":\"Gelareh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://namescan.io/insights/#/schema/person/image/\",\"url\":\"https://secure.gravatar.com/avatar/83c6625cd27be53e3a39fe8b36e93f0754ef0e3dabbbd75b21cd0403586910ef?s=96&d=mm&r=g\",\"contentUrl\":\"https://secure.gravatar.com/avatar/83c6625cd27be53e3a39fe8b36e93f0754ef0e3dabbbd75b21cd0403586910ef?s=96&d=mm&r=g\",\"caption\":\"Gelareh\"}}]}</script>\n<!-- / Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: The FATF Acts Against Cybercrime - NameScan Insight","description":" In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a report. Find out more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: The FATF Acts Against Cybercrime - NameScan Insight","og_description":" In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a report. Find out more!","og_url":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/","og_site_name":"NameScan Insight","article_publisher":"https://www.facebook.com/namescan.io/","article_published_time":"2023-09-05T02:26:04+00:00","article_modified_time":"2023-09-11T23:57:39+00:00","og_image":[{"width":1920,"height":1920,"url":"https://ar.namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg","type":"image/jpeg"}],"author":"Gelareh","twitter_card":"summary_large_image","twitter_creator":"@namescan_io","twitter_site":"@namescan_io","twitter_misc":{"Written by":"Gelareh","Est. reading time":"9 minutes"},"schema":{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#article","isPartOf":{"@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/"},"author":{"name":"Gelareh","@id":"https://namescan.io/insights/#/schema/person/a16c2d663b91785999852342fe2dae88"},"headline":"Ransomware: The FATF Acts Against Cybercrime","datePublished":"2023-09-05T02:26:04+00:00","dateModified":"2023-09-11T23:57:39+00:00","mainEntityOfPage":{"@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/"},"wordCount":1751,"commentCount":0,"publisher":{"@id":"https://namescan.io/insights/#organization"},"image":{"@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage"},"thumbnailUrl":"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg","articleSection":["Blog Post"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#respond"]}]},{"@type":"WebPage","@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/","url":"https://ar.namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/","name":"Ransomware: The FATF Acts Against Cybercrime - NameScan Insight","isPartOf":{"@id":"https://namescan.io/insights/#website"},"primaryImageOfPage":{"@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage"},"image":{"@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage"},"thumbnailUrl":"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg","datePublished":"2023-09-05T02:26:04+00:00","dateModified":"2023-09-11T23:57:39+00:00","description":" In response to the growing threat of ransomware attacks, the Financial Action Task Force (FATF) has issued a report. Find out more!","breadcrumb":{"@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#primaryimage","url":"https://ar.namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg","contentUrl":"https://namescan.io/insights/wp-content/uploads/2023/09/3d-internet-secuirty-badge.jpg","width":1920,"height":1920,"caption":"Ransomware attack"},{"@type":"BreadcrumbList","@id":"https://namescan.io/insights/ransomware-the-fatf-acts-against-cybercrime/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://namescan.io/insights/"},{"@type":"ListItem","position":2,"name":"Ransomware: The FATF Acts Against Cybercrime"}]},{"@type":"WebSite","@id":"https://namescan.io/insights/#website","url":"https://ar.namescan.io/insights/","name":"NameScan","description":"AML Risk Management and Compliance","publisher":{"@id":"https://namescan.io/insights/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://namescan.io/insights/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://namescan.io/insights/#organization","name":"NameScan","url":"https://ar.namescan.io/insights/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://namescan.io/insights/#/schema/logo/image/","url":"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png","contentUrl":"https://13.239.146.144/wp-content/uploads/2018/06/namescan-banner.png","width":300,"height":100,"caption":"NameScan"},"image":{"@id":"https://namescan.io/insights/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/namescan.io/","https://x.com/namescan_io","https://au.linkedin.com/company/namescan.io","https://www.youtube.com/channel/UCDMcXDG7Z965embyyEkWFLA"]},{"@type":"Person","@id":"https://namescan.io/insights/#/schema/person/a16c2d663b91785999852342fe2dae88","name":"Gelareh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://namescan.io/insights/#/schema/person/image/","url":"https://secure.gravatar.com/avatar/83c6625cd27be53e3a39fe8b36e93f0754ef0e3dabbbd75b21cd0403586910ef?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/83c6625cd27be53e3a39fe8b36e93f0754ef0e3dabbbd75b21cd0403586910ef?s=96&d=mm&r=g","caption":"Gelareh"}}]}},"_links":{"self":[{"href":"https://namescan.io/insights/wp-json/wp/v2/posts/13066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https://namescan.io/insights/wp-json/wp/v2/posts"}],"about":[{"href":"https://namescan.io/insights/wp-json/wp/v2/types/post"}],"author":[{"embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/users/4"}],"replies":[{"embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/comments?post=13066"}],"version-history":[{"count":5,"href":"https://namescan.io/insights/wp-json/wp/v2/posts/13066/revisions"}],"predecessor-version":[{"id":13070,"href":"https://namescan.io/insights/wp-json/wp/v2/posts/13066/revisions/13070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/media/13067"}],"wp:attachment":[{"href":"https://namescan.io/insights/wp-json/wp/v2/media?parent=13066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/categories?post=13066"},{"taxonomy":"post_tag","embeddable":true,"href":"https://namescan.io/insights/wp-json/wp/v2/tags?post=13066"}],"curies":[{"name":"wp","href":"https://api.w.org/{rel}","templated":true}]}}