888 865 4261
[email protected]
Login
Facebook
Twitter
LinkedIn
YouTube
logo-bluevolico-white-logo
  • DATA CENTERS
    • Data Centers Locations
    • FLL1 – Fort Lauderdale, FL
    • MIA1 – Miami, FL
    • MIA2 – Miami, FL
    • ATL1 – Atlanta, GA
    • Cross Connects
    • Smart Hands Support
    • BC/DR Workspace
    • Network & Infrastructure
    • Schedule a Tour
  • SERVICES
    • Services Overview
    • Colocation
      • Colocation Overview
      • Quote Request
      • Certifications and Compliance
        • Overview
        • SSAE 16 Compliance
        • HIPAA Compliance
        • PCI Compliance
      • Smart Hands Support
      • Carrier Neutral
      • 95th Percentile Billing
      • Colocation Checklist
    • Managed Services
      • Overview
      • Managed Security Services
      • Managed Firewall
      • Managed Backup
      • Monitoring Services
      • Data Center Migration Services
      • Unified Threat Management
      • Managed Clustering
      • Managed IT Services
      • Load Balancing
    • Dedicated Servers
      • Overview
      • Bare Metal Dedicated Servers
      • Bare Metal Apple M1 Servers
      • Pricing
      • Features
      • Server Specials
    • Cloud Hosting
      • Overview
      • Features
      • Public Cloud
      • Private Cloud
      • Hybrid Cloud
    • Enterprise Hosting
      • Overview
      • Disaster Recovery
      • Business Continuity
      • Industries
        • Healthcare
        • Financial Services
        • Government
        • Retail
        • Media
      • Solutions
      • Anti-DDoS
  • COMPANY
    • About Volico
    • Why Choose Volico?
    • Awards and Audits
    • Testimonials
    • Legal Notices
    • Identity
    • Careers
  • RESOURCES
    • Volico Blog
    • Resource Center
    • Case Studies
    • White Papers
    • Data Sheets
  • PARTNER PROGRAM
    • Overview
  • CUSTOMER SUPPORT
    • Support Center
    • Submit a Ticket
    • Knowledge Base
    • Payment Options
  • CONTACT
    • Contact Us
    • Get a Quote
    • Live Sales Chat
Home Managed Services Why Are Ransomware Developers Dropping Bitcoin for Monero / XMR
Why Cyber Criminals Choose Cryptocurrency

Why Are Ransomware Developers Dropping Bitcoin for Monero / XMR

April 16, 2018Managed Services, Securityvolico
Cryptocurrency has established itself as the payment method of choice for cybercriminals due to its decentralized nature, lack of government regulation, and relative anonymity.  As popular digital currencies like Bitcoin have snowballed in both public awareness and value, criminals are turning to alternatives that offer an even higher level of privacy and less volatility.  Today, the most popular option for cybercriminals is Monero (XMR) – a cryptocurrency that is all but untraceable.

What is a Cryptocurrency?

Cryptocurrencies are digital payment systems that allow direct peer-to-peer transactions over a network.  Unlike money in your bank account, this digital currency is not backed by any bank or government body. Instead, digital currencies rely on cryptography to verify and record all transactions, and the system is incorruptible due to blockchain construction.  Bitcoin was the world’s first cryptocurrency, and today it remains the largest.  There are now thousands of these digital payment systems. While they can still be used as forms of payment, digital currencies are more often seen as investments similar to stocks.

Why Criminals Choose Cryptocurrency

Cryptocurrencies are more difficult to trace than real money or bank transactions.  They are anonymous by design, so government agencies have difficulty associating a person in the physical world with the digital currency they are exchanging.  Using currencies like bitcoin, ransomware developers who traffic in stolen data can sell those digital assets on the dark web without risking the exposure of an in-person transaction.  Nonetheless, the popularity of cryptocurrencies has led to their prioritization by law enforcement, and criminals are now seeking lesser-known options.

What is the Difference Between Bitcoin and Monero?

Although bitcoin and Monero both offer anonymous exchanges of currency, bitcoin’s blockchain construction has made it possible for authorities to track when and where transactions have taken place.  In fact, the arrest of “Dread Pirate Roberts” – the founder of the black market website The Silk Road – in October of 2013 illustrates that Bitcoin is not as secure as cybercriminals would like it to be.  Monero, on the other hand, encrypts the transaction locations and amounts, allowing holders of the currency to operate under cover of digital secrecy.  Furthermore, Monero tricks any potential third-party onlookers by having each transaction appear to be potentially criminal.  Because oversight agencies treat anonymized transactions as high-risk, all transactions of Monero would automatically be flagged as suspect.  In addition to the aspect of secrecy, the transaction fees are significantly lower as well, making Monero the obvious choice for dealers of illicit goods and ransomware developers.

Prices of digital currencies have skyrocketed in the last year, which has made buying and owning these assets is much more risky.  As the market for cryptocurrencies grows, fluctuations have a greater effect on prices, which in turn discourages cybercriminals from using more mainstream options like bitcoin.  The migration of criminal actors towards more anonymous, less risk-prone digital currencies will persist as public investment grows in this sector.

Tags: Bitcoin, Blockchain, Cryptocurrency, Data Breach, Data Security, Monero, Ransomware
Previous post How Much Can a Data Breach Actually Cost Your Business? Next post The Most Common Causes of Hard Drive Failure

Related Articles

The Difference Between a Next Generation Firewall and a UTM Appliance

May 16, 2017volico

Volico Data Centers Completed its 2019 SOC 2 Type 2 Audit for Its Data Center Portfolio

July 18, 2019volico
UTM and NGFW solution

Understanding Enterprise Unified Threat Management (UTM) and Next-Generation Firewall (NGFW)

June 9, 2020volico

Resources Library

Recent Posts

  • What You Need To Know About SolarWinds Orion Security Breach
  • How Colocation Data Centers Services are Powering the Remote Workplaces
  • How is the new Apple M1 processor accelerating machine learning capabilities up to 15 times?

Categories

  • Backup and Storage
  • Blog
  • Cloud Hosting
  • Colocation
  • Compliance
  • Data Center
  • Dedicated Server
  • Disaster Recovery
  • Enterprise Hosting
  • Internet of Things
  • Managed Services
  • Monitoring Services
  • Products & Services
  • Security

Tags

24/7 Technical Support Backup Business Continuity Carrier-Neutral Cloud Compliance Cloud Computing Cloud Hosting Cloud Security Cloud Virtualization Colocation Compliance compliant hosting Connectivity Cybersecurity Data Center Data Recovery Data Security Data Storage DDoS Mitigation Dedicated Server Disaster Recovery Facilities High Availability HIPAA Compliance IoT Managed Backup Managed Cloud Managed Colocation Managed Dedicated Servers Managed Firewall managed security Managed Services Migration Services Monitoring Services PCI-DSS PCI Compliance Ransomware Redundancy Reliability Scalability Security Service Level Agreement SSAE 16 Compliance Tier IV UTM
SERVICES
DATA CENTER & COLOCATION
MANAGED SERVICES
CLOUD SERVICES
DEDICATED SERVERS
COMPLIANT HOSTING
ENTERPRISE HOSTING
SOLUTIONS
INDUSTRY SOLUTIONS
DISASTER RECOVERY
BUSINESS CONTINUITY
DDOS MITIGATION
MIGRATION SERVICES
DATA CENTER SERVICES
SMART HANDS SUPPORT
CROSS CONNECTS
BC/DR WORKSPACE
SECURITY & COMPLIANCE
CARRIER NEUTRAL
 
DATA CENTER LOCATIONS
MIA1 – MIAMI, FL
MIA2 – MIAMI, FL
FLL1 – FORT LAUDERDALE, FL
ATL1 - ATLANTA, GA
CHI1 - CHICAGO, IL
COMPANY
ABOUT VOLICO
PARTNER PROGRAM
WHY VOLICO DATA CENTER?
AWARDS AND AUDITS
TESTIMONIALS
CAREERS
RESOURCES
RESOURCE LIBRARY
VOLICO BLOG
CASE STUDIES
WHITE PAPERS
DATASHEETS
CONTACT
SALES & SUPPORT: 888.865.4261
CONTACT US
GET A QUOTE
LIVE CHAT
SCHEDULE A TOUR
 
SUPPORT
SUPPORT CENTER
SUBMIT A TICKET
Facebook
Twitter
LinkedIn
YouTube
Legal NoticesPrivacy PolicyTerms of UseAcceptable Use Policy
© 2020 Copyright © Volico Data Centers. All Rights Reserved