Profit motives are a powerful incentive for criminals hackers who roam the internet locking up victims data and demanding a ransom for releasing it: In June, just one scheme a cyberattack that crippled the worlds largest meat processing company yielded an $11 million bounty for a Russia-based hacker gang. But those flows of dirty money also place the gangs squarely in the IRS bailiwick.
A lot of other agencies do more of the technical investigation of the actual [hacking] infrastructure, said Jarod Koopman, acting head of the IRS recently combined cybercrime and digital forensics team, acknowledging that his agency is just one part of a governmentwide anti-hacking effort that includes entities such as the FBI and the Department of Homeland Security. Our wheelhouse is that financial tracing.
The IRS role in hacker probes has also gone beyond ransomware. After the U.S. became aware in late 2020 of a wide-ranging cyberespionage campaign blamed on Russias Foreign Intelligence Service, the IRS used its cryptocurrency tracing tools to learn more about the intruders who had broken into at least nine federal agencies and 100 private companies.
But ransomware has emerged as an especially bedeviling threat to governments and businesses worldwide, after years of attacks have targeted victims including police departments, water utilities and the National Rifle Association. One challenge to investigating such crimes is the fact that the perpetrators overwhelmingly demand payment in cryptocurrency because of its supposed untraceability.
The IRS criminal investigations are the tip of the spear when it comes to crypto investigations, said Ari Redbord, a former senior official in the Treasury Departments terrorism and financial intelligence office.
The IRS has two main avenues for hindering ransomware: It could theoretically track the cryptocurrency payments through companies and other victims tax returns, and it can investigate the underground movement of cryptocurrencies between victims and ransomware gangs.
Congress helped the first scenario a bit when passing last years bipartisan infrastructure package, which expanded the tax codes definition of broker to include cryptocurrency exchanges like Coinbase. These brokers, typically people who buy and sell stocks on someones behalf, will eventually have to report annually the names and addresses of their customers whenever they file tax returns after trading or selling crypto providing a level of transparency into the average crypto owners transactions that doesnt exist now.
We do see a growing level of crypto literacy, sophistication and agility across these federal agencies thats reassuring.
Gurvais Grigg
Its a step in the right direction for cybersecurity policy experts who have pushed the IRS and Congress to require companies to disclose high-dollar cryptocurrency payments, arguing it could provide additional insight into when a ransom payment is made.
As a first step, you have to know the universe of what were doing here, said Michael Daniel, president of the Cyber Threat Alliance and a former National Security Council cyber adviser during the Obama administration. Obviously youll never get 100 percent reporting, but you can get a very good statistically accurate picture of whats happening in the economy.
But tax reporting has severe limits. In most instances, the new reporting rules focus on the entity receiving the funds, which in this case would be the Russian ransomware criminals who arent subject to U.S. tax laws or known for obeying government mandates.
The IRS has had better luck tracking down ransomware gangs through the second option: digging into ransomware gangs cryptocurrency transactions or advising the FBI and DHS on how to do it.
At the IRS, Koopman said the agency relies on two types of tools for cryptocurrency investigations: so-called clustering algorithms that gauge the likelihood that two digital wallets are connected to one another, and open-source intelligence, including public records such as wallet addresses, domain name registrations, email addresses and court documents.
Often the agency works with companies like Chainalysis that have proprietary technologies that make linking one Bitcoin wallet to another a lot faster. One example Koopman pointed to is a tool that collects all the public-not-public data about people into one place to make homing in on possible suspects much easier.
The IRS isnt a silver bullet on its own, though. Redbord, who is also a former assistant U.S. attorney, said federal prosecutors often have a choice in which agency they go to with cybercrime tips: the FBI, Homeland Security or the IRS.
The differences among the three are somewhat limited because they all use the same cryptocurrency tracing tools and open-source investigative tactics. We all work very closely, so its all of us bringing our expertise to the table, Koopman said.
However, both the FBI and the Homeland Security Departments investigative unit, known as HSI, are more equipped than the IRS to focus on the technicalities of a ransomware attack, such as how the hackers broke in and what ransomware strain they deployed. Tapping the IRS to focus on the cryptocurrency side of an investigation helps law enforcement keep up with cybercriminals agility and constantly changing online locations.
There is a perception that [the agencies] all dont get along and that they never work cases jointly, Redbord said. But if you look at the big crypto investigations, they involve IRS [criminal investigations], HSI and FBI, and what we would do is create a dream team of agents across the interagency to drive together.
The FBI brings its range of investigatory experience, tools and funding. DHS investigations unit, which sits within Immigrations and Customs Enforcement, often has one key ingredient needed to start an investigation: the digital wallet addresses found through any electronics seizures at the border. And the IRS brings the financial nitty-gritty and somewhat nerdy know-how.
That detailed financial crime knowledge allows the IRS to crack cryptocurrency cases at a pace like no other, Redbord said.
In many regards, the IRS cyber criminal investigations unit has a startup mentality. It was created in 2014, making it much younger than the more established cyber investigations offices at the FBI and DHS.
The IRS played only supporting roles in cybercrime cases until 2019, when it led an investigation that resulted in a Justice Department takedown of a South Korean child pornography ring and its dark-web site, Welcome to Video. Visitors to the site had to pay in bitcoin to watch videos, and by tracing the flow of the cryptocurrency payments, the IRS was able to close the case in eight months.
Its really one of the first times youve got a case that isnt solely focused on server logs or some kind of special high tech, said IRS agent Chris Janczewski, who led the probe. It was just a lot of following the money.
When Janczewski started investigating Welcome to Video, the only lead he had was the location of the website itself. Koopman likens the scenario to what investigators usually see at the beginning of a ransomware investigation: You have the technology aspect of the attacks, the footprint of what occurred and then you have the transactional flow, Koopman said about ransomware cases. Thats it.
But there are a few limits to following the money in cybercrime, said Gurvais Grigg, global public sector chief technology officer at Chainalysis. Cybercriminals are agile and quick to cover their tracks, and law enforcement officers could lose their chance to track them while waiting for higher-ups approval to start an investigation.
On the other hand, we do see a growing level of crypto literacy, sophistication and agility across these federal agencies thats reassuring, said Grigg, who is also a former FBI investigator.
International probes face other roadblocks: The most notorious ransomware actors live in Russia, which is usually unlikely to cooperate with U.S. law enforcement. The one exception: Russias arrest last month of a hacker accused of being behind last years Colonial Pipeline attack.
But Janczewski said the IRS has experience tackling those hurdles, noting a couple of cases in which his team found transactions en route, digitally, to China or Russia as they crossed through U.S. allied countries.
When it comes to international investigations, especially if you want them to be timely, its all based on relationships, Janczewski said.
The IRS parent, the Treasury Department, is also likely to take on a growing role in the ransomware fight. In September, the department announced sanctions against Suex, a crypto exchange operating in Russia, saying 40 percent of its transactions involved ransomware and other illicit online activities. At the time, Treasury indicated that this could be the first of several actions against similar exchanges.
Congress is also on the move.
In September, Sen. Maggie Hassan (D-N.H.) introduced legislation, S. 2864, that would direct the Treasury Department to tell Congress how other nations are mining, using and regulating cryptocurrencies. Several lawmakers have introduced proposals to mandate reporting of ransom payments within two to three days, depending on the bill, to DHS a step that would provide more insight into how many ransomware attacks U.S. businesses are facing, as well as hackers financial information. And Hassan is already in conversations with the IRS about the best way to help them address cryptos use in cybercrime.
In a letter released earlier this month, IRS Commissioner Charles Rettig requested $21 million to support cyber, crypto and other highly technical investigations. He also suggested that Congress tweak current crypto reporting rules so the IRS can more easily share the information with its investigative partners at Treasurys Financial Crimes Enforcement Network and other agencies.
This could all come in handy as the Biden administration continues to toss anything it can at the burgeoning ransomware problem.
When you look at the strategy that you would need to put together to combat ransomware, youre going to need a large number of different departments and agencies across the federal government, said Daniel, of the Cyber Threat Alliance. It has so many different aspects to it.
Read more here:
The agency that may be able to thwart ransomware - POLITICO
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]