US Fights Ransomware with $10 Million Reward
The United States government says it will pay up to $10 million for information on criminal activity over computer networks against important U.S. infrastructure.
Cyber criminals often take advantage of openings in security to take control of computer systems. They then ask for large amounts of money – often millions of dollars – to give back control of the system to the owner. This is known as a ransom. The U.S. government believes these criminals do their work without fear of arrest in Russia and several other countries.
People can now send information, known as a tip, about criminals to the U.S. government. They can send tips without giving their name through a form on the part of the internet known as the dark web.
Sometimes the U.S. government is the target of a cyberattack, but other times, private companies that are important to the U.S. economy are victims as well.
For example, an attack earlier this year against Colonial Pipeline disrupted work and travel for about a week in the eastern part of the U.S. The criminal group used software known as ransomware to take control of the pipeline's computer systems. It only released its control after getting a payment of over $4 million. Most of the money was later recovered by the U.S. Federal Bureau of Investigation.
REvil, another criminal group based in Russia, launched a ransomware attack on July 2 against more than 1,000 organizations and businesses around the world. After the group's disappearance, an administration official would not say if the U.S. made the group go away. And a Russian official said he did not know about the group.
Some cybercrime experts, however, think REvil may have disappeared to avoid U.S. officials.
President Joe Biden's administration is also educating businesses and individuals on how to keep their computer systems safe through a new website called stopransomware.gov.
And the U.S. Treasury Department said it will work with banks and technology companies to avoid becoming victims of ransomware attacks.
I'm Dan Friedell.