US Treasury Tracks $4.5B in Ransom Payments since 2013

darkreading

Overview

The US Treasury's Financial Crimes Enforcement Network has reported that ransomware payments have reached $4.5 billion since 2013, highlighting the increasing severity and prevalence of ransomware attacks. This data underscores the urgent need for enhanced cybersecurity measures and awareness as these attacks continue to evolve and impact various sectors.

Key Takeaways

  • Timeline: Ongoing since 2013

Original Article Summary

The US Treasury's Financial Crimes Enforcement Network shared data showing how dramatically ransomware attacks have changed over time.

Impact

Not specified

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Ongoing since 2013

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Ransomware.

Related Coverage

Oracle Patches 450 Vulnerabilities With April 2026 CPU

SecurityWeek

Oracle has released a significant update, patching 481 vulnerabilities across 28 of its product families. Among these, over 300 patches address remotely exploitable flaws that do not require authentication, making them particularly concerning for users. This update is part of Oracle's April 2026 Critical Patch Update (CPU), which aims to enhance security for its various software products. Users of Oracle software should prioritize applying these patches to protect their systems from potential attacks. The vulnerabilities could allow attackers to exploit systems without needing any user credentials, which increases the urgency for swift action.

Apr 22, 2026

Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

The Hacker News

Researchers have identified a new variant of the LOTUSLITE malware, which is being used to target banks in India and policy circles in South Korea. This malware operates as a backdoor, allowing attackers to communicate with a command-and-control server using dynamic DNS over HTTPS. It offers features like remote shell access, file operations, and session management, indicating its use for espionage purposes. The focus on the banking sector suggests that attackers may be seeking sensitive financial information or operational data. This development raises concerns about the security of financial institutions in India and the potential implications for their clients and operations.

Apr 22, 2026

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

The Hacker News

A serious security flaw has been identified in the Python-based sandbox environment known as Terrarium. This vulnerability, assigned the identifier CVE-2026-5752, has a CVSS score of 9.3, indicating its high severity. Attackers can exploit this flaw to execute arbitrary code with root privileges on the host machine by manipulating the JavaScript prototype chain. This issue is particularly concerning for developers and organizations using Terrarium, as it may allow unauthorized access to sensitive systems and data. Users of this sandbox environment should prioritize addressing this vulnerability to mitigate potential risks.

Apr 22, 2026

Report: FTP protocol security gaps expose millions of systems

SCM feed for Latest

A recent report indicates that approximately half of the 6 million internet-connected systems using the outdated File Transfer Protocol (FTP) are not secured with encryption. This lack of encryption makes these systems particularly vulnerable to cyberattacks, as attackers can easily intercept sensitive data during file transfers. The findings, reported by SecurityWeek, raise concerns for organizations relying on FTP for data transfer, as they may unwittingly expose critical information to cybercriminals. Given the prevalence of FTP usage, the implications of these security gaps could be widespread, impacting various industries. Companies should prioritize upgrading to more secure file transfer methods to protect their data from potential breaches.

Apr 21, 2026

Several flaws found in serial-to-IP converters used in critical sectors

SCM feed for Latest

Forescout Technologies has discovered 20 security vulnerabilities in Sliex and Lantronix serial-to-IP converters, commonly used in sectors like healthcare and operational technology. These vulnerabilities can be exploited without any authentication, meaning attackers could potentially gain remote access to critical systems. This is a serious concern, as these converters play a vital role in enabling communication between devices. The exposure could lead to unauthorized control or data breaches, impacting patient care and industrial operations. Organizations relying on these devices need to take immediate action to protect their systems from potential attacks.

Apr 21, 2026

Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks

CyberScoop

During a recent House Homeland Security Committee hearing, lawmakers discussed the rising issue of ransomware attacks targeting hospitals. These attacks have significant implications for patient care and safety, leading to concerns that they may warrant designations as terrorism or even homicide charges against perpetrators. The discussions reflect growing frustration over the frequency and severity of these attacks, which not only disrupt healthcare services but can also endanger lives. As ransomware incidents increase, lawmakers are considering more serious legal consequences to deter future attacks and protect vulnerable healthcare systems from cybercriminals. This initiative highlights the urgent need for stronger cybersecurity measures in the healthcare sector.

Apr 21, 2026