{"id":39430,"date":"2021-02-04T14:00:06","date_gmt":"2021-02-04T14:00:06","guid":{"rendered":"http:\/\/1c2ae0eb-1cf8-45b0-a496-268ddc54c5a5"},"modified":"2021-02-04T14:00:06","modified_gmt":"2021-02-04T14:00:06","slug":"blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/","title":{"rendered":"Blockchain transactions confirm murky and interconnected ransomware scene"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2021\/02\/04\/6ad088dc-c136-4e9a-a9d9-9c178440dfa0\/ransomware-partnership.jpg\" class alt=\"ransomware-partnership.jpg\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Geralt on Pixabay <\/span><\/figcaption><\/figure>\n<p>A report published today by blockchain investigations firm Chainalysis confirms that cybercrime groups engaging in ransomware attacks don&#8217;t operate in their own bubbles but often switch ransomware suppliers (RaaS services) in a search for better profits.<\/p>\n<p>The report analyzed how Bitcoin funds were transferred from victims to criminal groups, and how the money was divided among different parties involved in the ransomware attack, and how it was eventually laundered.<\/p>\n<p>But to understand these dynamics, a short intro into the current ransomware scene is needed. Today, the ransomware landscape is very similar to how modern businesses operate.<\/p>\n<p>There are coders who create and rent the actual ransomware strain via services called RaaS &#8212; or Ransomware-as-a-Service &#8212; similar to how most modern software is provided today.<\/p>\n<p>Some RaaS operators rent their ransomware to anyone who signs up, while others prefer to work with small groups of verified clients, which are usually called &#8220;affiliates.&#8221;<\/p>\n<p>The affiliates are the ones to usually spread the ransomware via email or orchestrate intrusions into corporate or government networks, which they later infect and encrypt with the ransomware they rented from the RaaS operator.<\/p>\n<p>In some cases, the affiliates are also multiple groups themselves. Some are specialized in breaching a company&#8217;s network perimeter, and are called initial access vendors, while some groups are specialized in expanding this initial access inside hacked networks to maximize the ransomware&#8217;s damage.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>All in all, the ransomware landscape has evolved from previous years and is now a collection of multiple criminal groups, each providing its own highly-specialized service to one another, often across different RaaS providers.<\/p>\n<h3>BTC transactions show collaborations between criminal groups<\/h3>\n<p>The&nbsp;<a href=\"https:\/\/blog.chainalysis.com\/reports\/ransomware-connections-maze-egregor-suncrypt-doppelpaymer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Chainalysis report<\/a>&nbsp;released today confirms these informal theories with undisputable and unforgeable cryptographic proof left behind by the Bitcoin transactions that have taken place among some of these groups.<\/p>\n<p>For example, based on the graph below, Chainalysis said it found evidence to suggest that an affiliate for the now-defunct Maze RaaS was also involved with SunCrypt RaaS.<\/p>\n<p>&#8220;We see that the Maze affiliate also sent funds \u2014 roughly 9.55 Bitcoin worth over $90,000 \u2014 via an intermediary wallet to an address labeled &#8216;Suspected SunCryptadmin,&#8217; which we&#8217;ve identified as part of a wallet that has consolidated funds related to a few different SunCrypt attacks,&#8221; Chainalysis said.<\/p>\n<p>&#8220;This suggests that the Maze affiliate is also an affiliate for SunCrypt, or possibly involved with SunCrypt in another way.&#8221;<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\" class=\"lazy\" alt=\"ca-maze-suncrypt.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2021\/02\/04\/9ee48c22-9c10-494c-833d-a335eb106da1\/ca-maze-suncrypt.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2021\/02\/04\/9ee48c22-9c10-494c-833d-a335eb106da1\/ca-maze-suncrypt.png\" class alt=\"ca-maze-suncrypt.png\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Chainalysis <\/span><\/figcaption><\/figure>\n<p>Similar findings also show a connection between the Egregor and DoppelPaymer operations.<\/p>\n<p>&#8220;In this case, we see that an Egregor wallet sent roughly 78.9 BTC worth approximately $850,000 to a suspected Doppelpaymer administrator wallet,&#8221; researchers said.<\/p>\n<p>&#8220;Though we can&#8217;t know for sure, we believe that this is another example of affiliate overlap. Our hypothesis is that the Egregor-labeled wallet is an affiliate for both strains sending funds to the Doppelpaymer administrators.&#8221;<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\" class=\"lazy\" alt=\"ca-egregor-dp.png\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2021\/02\/04\/801ea03a-b245-497d-8344-e89b948f0180\/ca-egregor-dp.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2021\/02\/04\/801ea03a-b245-497d-8344-e89b948f0180\/ca-egregor-dp.png\" class alt=\"ca-egregor-dp.png\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Chainalysis <\/span><\/figcaption><\/figure>\n<p>And last but not least, Chainalysis researchers also found evidence that the operators of the Maze and Egregor operations also used the same money-laundering service and over-the-counter brokers to convert stolen funds into fiat currency.<\/p>\n<p>Since several security firms have suggested that the Egregor RaaS is a rebrand and continuation of the older and defunct Maze operation, such findings come to support these theories, showing how old Maze tactics permeated to the new Egregor operation.<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\" class=\"lazy\" alt=\"ca-m-e.png\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2021\/02\/04\/54c190da-8a22-448a-8337-d51cb3606c55\/ca-m-e.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2021\/02\/04\/54c190da-8a22-448a-8337-d51cb3606c55\/ca-m-e.png\" class alt=\"ca-m-e.png\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Chainalysis <\/span><\/figcaption><\/figure>\n<h3>Report confirms observations made by security firms<\/h3>\n<p>&#8220;Interesting report and very much aligns with what we are seeing,&#8221; <a href=\"https:\/\/twitter.com\/uuallan\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Allan Liska<\/a>, a security researcher with threat intel firm Recorded Future, told ZDNet.<\/p>\n<p>&#8220;Recorded Future is seeing more fluidity in the RaaS market now than at any other time in the (admittedly short) history of the RaaS market.<\/p>\n<p>&#8220;Part of this is because of the reality that there is a growing stratification between the haves and have nots in ransomware. There are fewer actors making a lot of money, so ransomware actors are jumping from one RaaS to another to improve their chances of success,&#8221; the Recorded Future analyst said.<\/p>\n<p>Furthermore, Liska says there are other connections and overlaps between other RaaS groups, and not just Maze, SunCrypt, and Egregor.<\/p>\n<p>The Recorded Future analyst pointed to the Sodinokibi (aka REvil) RaaS operation as being one of the services where many groups overlap, primarily because the Sodinokibi administrator, an individual going by the name of Unknown, has often actively and openly recruited affiliates from other RaaS programs.<\/p>\n<h3>Interconnected landscape is actually a good sign<\/h3>\n<p>But while we might view these connections and overlaps as a sign of successful cooperation between cybercrime groups, Chainalysis believes that this interconnectedness is actually a good sign for law enforcement.<\/p>\n<p>&#8220;The evidence suggests that the ransomware world is smaller than one may initially think given the number of unique strains currently operating,&#8221; Chainalysis said.<\/p>\n<p>This, in theory, should make cracking down and disrupting ransomware attacks a much easier task since a carefully planned blow could impact multiple groups and RaaS providers at the same time.<\/p>\n<p>According to Chainalysis, these weak spots are the money-laundering and over-the-counter services that RaaS operators and their affiliates often use to convert their stolen funds into legitimate currency.<\/p>\n<p>By taking out legitimate avenues for converting funds and reaching real-world profitability, Chainalysis believes RaaS operations would have a hard time seeing a reason to operate when they can&#8217;t profit from their work.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminal gangs often use multiple ransomware strains and jump ship from one RaaS (Ransomware-as-a-Service) to another, seeking better deals.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39431,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-39430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain transactions confirm murky and interconnected ransomware scene 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain transactions confirm murky and interconnected ransomware scene 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-04T14:00:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"549\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Blockchain transactions confirm murky and interconnected ransomware scene\",\"datePublished\":\"2021-02-04T14:00:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\"},\"wordCount\":893,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\",\"name\":\"Blockchain transactions confirm murky and interconnected ransomware scene 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg\",\"datePublished\":\"2021-02-04T14:00:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg\",\"width\":1000,\"height\":549},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain transactions confirm murky and interconnected ransomware scene\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockchain transactions confirm murky and interconnected ransomware scene 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain transactions confirm murky and interconnected ransomware scene 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-04T14:00:06+00:00","og_image":[{"width":1000,"height":549,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Blockchain transactions confirm murky and interconnected ransomware scene","datePublished":"2021-02-04T14:00:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/"},"wordCount":893,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/","url":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/","name":"Blockchain transactions confirm murky and interconnected ransomware scene 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg","datePublished":"2021-02-04T14:00:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene.jpg","width":1000,"height":549},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/blockchain-transactions-confirm-murky-and-interconnected-ransomware-scene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Blockchain transactions confirm murky and interconnected ransomware scene"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39430"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39430\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39431"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}