FBI: Malware Victims Should Pay Bitcoin Ransoms

Victims of malware, such as bitcoin ransomware Cryptolocker, should pay off the perpetrators, an FBI agent has advised.

AccessTimeIconOct 26, 2015 at 12:46 p.m. UTC
Updated Dec 11, 2022 at 1:54 p.m. UTC

Victims of malware, such as bitcoin ransomware Cryptolocker, should just pay off the perpetrators if they want to see their data again, an FBI agent has advised.

According to Security Ledger, Acting Special Agent Joseph Bonavolonta, who oversees the bureau's Boston office, told C-level executives at Wednesday's Cyber Security Summit they'd be better off stumping up the ransom.

According to an FBI report from June, this sum can be anywhere from $200 to $10,000. Bonavolonta said:

"The amount of money made by these criminals is enormous and that’s because the overwhelming majority of institutions just pay the ransom ... To be honest, we often advise people just to pay the ransom."

Programs like Cryptolocker and Cryptowall – typically spread through phishing emails – demand bitcoin to unlock files they have encrypted on a user's computer.

The FBI said it had received 992 complaints about (now defunct) Cryptolocker in a 14-month period, with victims reporting losses of $18m. "Criminals prefer bitcoin because it's easy to use, fast, publicly available, decentralized and provides a sense of heightened security/anonymity," its report read.

Because ransomware has found success on such a vast scale, Bonavolonta said attackers are likely to keep their demands low to maximise profit. For this same reason, they are mostly honest, he added: "You do get your access back."

No guarantees

Bonavolonta's advice comes counter to many public advisories on the subject to date. In 2013, when Cryptolocker first swept the UK, the National Crime Agency (NCA) issued a statement telling businesses not to pay up.

"The NCA would never endorse the payment of a ransom to criminals and there is no guarantee that they would honour the payments in any event," its statement read.

In April, a security researcher from Kaspersky Labs, Jornt van der Wiel, echoed this sentiment, telling CoinDesk: "As there are few ways to get files back without paying, users often just give in. This is the wrong strategy, but it’s often the easiest for the user."

Others, including authorities in The Netherlandshttps://www.politie.nl/nieuws/2015/april/13/11politie-zorgt-voor-doorbraak-in-recente-cryptoware-aanval.html, argue that payment actually helps to perpetuate the problem, as it gives malware operators an incentive to continue – and target new victims.

A 2014 study of 39,760 people from security firm ESNET showed that only 1.4% of victims actually paid the Cryptolocker ransom.

While some were given access to decryption software, others were not – usually because the full amount hadn't been paid.

Ransom image via Shutterstock

Correction: A previous version of this article stated that 1.4% of Cryptolocker victims who paid the ransom were given access to decryption software. This has since been corrected.


Please note that our privacy policy, terms of use, cookies, and do not sell my personal information has been updated.

The leader in news and information on cryptocurrency, digital assets and the future of money, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups. As part of their compensation, certain CoinDesk employees, including editorial employees, may receive exposure to DCG equity in the form of stock appreciation rights, which vest over a multi-year period. CoinDesk journalists are not allowed to purchase stock outright in DCG.

Learn more about Consensus 2024, CoinDesk’s longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.