On December 4, 2025, the U.S. Treasury's Financial Crimes Enforcement Network (FinCEN) published a Financial Trend Analysis detailing the severe economic impact of ransomware. Based on an analysis of Bank Secrecy Act (BSA) filings, FinCEN found that over $2.1 billion in ransomware-related payments were reported across 4,194 incidents from the beginning of 2022 through 2024. This figure highlights the unabated profitability of the ransomware ecosystem. The report indicates a significant peak in 2023, which saw $1.1 billion in payments alone. The analysis identifies top ransomware variants, including ALPHV/BlackCat, LockBit, and Akira, and points to the manufacturing and financial services industries as the most heavily targeted. The report serves as a stark reminder of the scale of the ransomware threat and reinforces the importance of public-private information sharing to combat it.
The FinCEN report is not a new regulation but an analysis of data collected under the existing Bank Secrecy Act. The BSA requires U.S. financial institutions to assist government agencies in detecting and preventing money laundering. This includes filing Suspicious Activity Reports (SARs) for transactions that may be related to criminal activity. In the context of ransomware, financial institutions, including convertible virtual currency (CVC) exchangers and administrators, are obligated to report payments they suspect are linked to ransomware demands. This data provides FinCEN with unique visibility into the financial flows of the ransomware economy.
The report highlights that ransomware is a sector-agnostic threat, but some industries are disproportionately affected. The most targeted sectors based on BSA reporting were:
The analysis also notes the critical role of Initial Access Brokers (IABs) in the ransomware ecosystem, who provide ransomware gangs with access to already-compromised corporate networks.
The $2.1 billion figure represents only the reported payments and is likely a fraction of the true total cost of ransomware. The overall business impact extends far beyond the ransom payment itself and includes:
FinCEN's analysis demonstrates that ransomware remains a highly lucrative and persistent criminal enterprise, posing a significant threat to economic stability and national security.
While the report does not introduce new rules, it reinforces existing obligations for financial institutions:
FinCEN Director Andrea Gacki's statement underscores the value of this reporting, as it provides law enforcement with the 'critical information to help detect cybersecurity trends that can damage our economy.'
Train users to recognize and report phishing attempts, which are a primary initial access vector for ransomware.
Enforce MFA on all remote access points and critical internal systems to prevent attackers from using compromised credentials.
Consistently patch vulnerabilities in internet-facing systems and software to block common entry points for ransomware actors.
The most effective defense against the impact of a ransomware attack is the ability to restore systems and data without paying the ransom. Organizations must implement a robust backup strategy following the 3-2-1 rule: three copies of data, on two different media types, with one copy off-site and offline or immutable. Test restoration procedures regularly to ensure that backups are viable and that recovery time objectives (RTOs) can be met. This directly counters the primary leverage of ransomware actors (data encryption) and is a foundational element of cyber resilience.
Many ransomware attacks, including those by top variants like LockBit and ALPHV, begin with the exploitation of compromised credentials. Enforcing MFA across the enterprise is a critical preventative control. Prioritize deployment on all remote access solutions (VPNs, RDP gateways), cloud services (O365, AWS), and privileged accounts (Domain Admins). This single control dramatically raises the difficulty for attackers to gain initial access and move laterally, even if they have acquired a valid username and password.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats