Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Every company should have access to a bitcoin account

By Keith Barnett, Tim Butler Butler, Carlin McCrory, Matt White
bitcoin--crypto-currencies-freepik
October 19, 2021

Ransomware attacks have become a fixture of U.S. business. They are far more common than publicly reported, and the consequences can be severe. Despite the Federal Bureau of Investigation’s (FBI) success in recovering some of the ransom paid by a pipeline operator after the payment had moved through at least six other bitcoin wallets, there is no guarantee that future victims will be successful in recovering the ransom money. The bad actors are not going to stop anytime soon.


So, what is a company to do? Until a company faces the reality of a ransomware attack, it is easy to believe that you never will pay the ransom. In fact, federal government agencies such as The Cybersecurity and Infrastructure Security Agency (CISA), the Department of Homeland Security (DHS) and the FBI explicitly advise ransomware victims not to pay the ransom because it rewards the bad actors and encourages future attacks. That may have been the initial view of victims of recent high-profile ransomware attacks, but when confronted with gas shortages along the east coast and a shutdown of several major meatpacking facilitates, each concluded that it was best to negotiate and pay the ransom.  


The change in views is even quicker when the victim is in a hospital or other business where the damage is quick and can be irreparable. In 2019, at least two medical facilities, Brookside ENT & Hearing Services and Wood Ranch Medical, permanently shut their doors as a result of ransomware attacks.


Paying the ransom is not as easy as you might think. It is not as simple as providing wire transfer instructions to a bank and getting a confirmation number 30 minutes later that the money has arrived. 


Instead, it involves sending bitcoin from a bitcoin account. Opening a bitcoin account is not hard — over 100 million investors have done it — but the entities that hold and transfer bitcoins, such as Coinbase, eToro, and Gemini, are subject to the “know your customer,” or KYC, rules, and their compliance with those rules can take from several hours to a day or two.  And Coinbase’s website states that it may take 3-5 business days (which could be 7-10 actual days) before an account is funded through an ACH transfer of U.S. dollars from a bank account to a Coinbase account. That delay is the last thing that a company wants when it has made the decision to pay the ransom in exchange for the encryption key.  


By contrast, once an account is open, adding to it generally is as easy as sending a wire transfer. As a result, despite a company’s belief on how it would respond in the event of a ransomware attack, companies should consider opening a bitcoin account with a nominal amount of bitcoin in it so that it is at least is prepared to timely make the tough decision should the need arise. 


Alternatively, you may want to consider engaging a ransomware response vendor, which already has access to a bitcoin account, along with a database of prior payments to help you negotiate the best result. 


Does paying the ransom fix all of a victim’s problems? Maybe not. 


It may take several months or even years to restore the compromised systems, which is why it makes sense to have a business continuity plan for critical business functions ahead of time. 


The length of recovery time underscores the reason why a company should already have bitcoin immediately available. Although insurance coverage is available for ransomware attacks, insurance exists to reimburse companies for their losses — the insurance companies are not going to pay the ransomware on behalf of the insured within 24 hours.  


In fact, as a result of the increased incidents of ransomware attacks, purportedly 304 million attacks in 2020 alone, insurance premiums for ransomware attacks have substantially increased. Insurance companies may look to deny or reduce claims based upon a company’s failure to mitigate its damages by having a bitcoin account readily available to pay a ransom and expeditiously receive a key to restore its systems.  How much bitcoin is needed? Not a lot, as a single bitcoin can suffice as a starting point, but at least something. 


In addition to having access to a bitcoin account, companies should have written compliance and business continuity policies and training in place in the event of a ransomware attack. The compliance policies should, at minimum, remind the decision-makers that while the act of paying the ransom to the bad actor is itself not unlawful, the company (or the ransomware response vendors hired by the company) must contact the Department of Treasury to make sure that the bad actor is not on the OFAC sanctions list because paying ransom to anyone on that list is a federal crime. Companies should also use the literature disseminated on the FinCEN, CISA, DHS, and the FBI websites as guidance.


Recent high-profile ransomware attacks instruct private entities not to wait for or rely upon the federal or state government to resolve the existing and future damage arising out of ransomware attacks. Indeed, U.S. Senator Gary Peters of Michigan stated that “private entities, especially those that are critical to our nation’s infrastructure, are responsible for assessing their individual risk and investing in the technology to prevent breaches and to ensure that they can continue to provide service to customers who rely on them for basic necessities like fuel.”  


Representative Carolyn Maloney, Chairwoman of the House Committee on Oversight and Reform, recently sent a letter to the CEO of JBS Foods USA stating that the attack has increased consumer costs for beef and “[a]ny ransom payment to cybercriminal actors like REvil sets a dangerous precedent that increases future risk of ransomware attacks.”.  


As “cybercriminal actors” become more sophisticated, it will be harder to prevent the damaging breaches that Senator Peters mentioned or the increased costs to consumers that Chairwoman Maloney mentioned in her letter. That is why every company should be proactive and implement numerous controls, including access to a bitcoin account.

KEYWORDS: cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keith Barnett is a Partner of Troutman Pepper.

Tim Butler is a Partner at Troutman Pepper.

Carlin McCrory is an Associate at Troutman Pepper.

Matt White is an Associate at Troutman Pepper.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • c-suite

    5 Key Skills Every Incoming CISO Should Have

    See More
  • SEC0219-pen-Feat-slide1_900px

    11 Types of Spoofing Attacks Every Security Professional Should Know About

    See More
  • disaster recovery freepik

    Only 54% of organizations have a company-wide disaster recovery plan in place

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!