
Publication
Navigating international trade and tariffs
Recent tariffs and other trade measures have transformed the international trade landscape, impacting almost every sector, region and business worldwide.
United States | Publication | November 11, 2021
On November 8, the United States Financial Crimes Enforcement Network (FinCEN) published a new advisory on: “Ransomware and the Use of the Financial System to Facilitate Ransom Payments,” (the advisory), which updates an advisory that FinCEN issued in October 2020 on the same topic.
The advisory is another in what has been a succession of guidance and reports that have been issued in recent months by the Office of Foreign Asset Control (OFAC), the Department of Justice and the Security and Exchange Commission. Our firm previously published a client update (available here) addressing OFAC’s September 21, 2021 updated ransomware guidance, including the potential sanctions risk faced by parties who make or facilitate a ransom payment to a sanctioned entity, as well as the significant mitigation credit such parties may receive if they take certain steps, including implementing a reasonable sanctions compliance program and promptly notifying and cooperating with relevant government and law enforcement agencies.
This most recent FinCEN advisory is based on information contained in FinCEN’s Financial Trend Analysis Report that was issued in October 2021, and describes new trends and typologies of ransomware and associated payments, including the growing use of Anonymity-Enhanced Cryptocurrencies (AECs) and decentralized mixers. The advisory will be of particular interest to financial institutions, particularly banks and MSBs that engage in money transmission related to cryptocurrency transactions. For other businesses that provide services that may involve cryptocurrency transactions, the advisory raises the question as to whether they should be registered and licensed as MSBs, with the attendant obligation to implement AML compliance programs and file suspicious activity reports (SARs).
Key messages that should be taken from the advisory include:
FinCEN’s objective is to ensure that financial institutions are capable of identifying transactions related to ransomware payments and providing enforcement agencies with relevant and timely information about those transactions. Unlike the advisory issued by OFAC in September, the FinCEN advisory covers all suspected ransomware payments whether they are ultimately provided to a sanctioned entity or not. The advisory identifies convertible virtual currency (CVC) as the preferred payment method of payment for ransomware and notes that most ransomware schemes involve a series of transactions that include at least one depository institution and other intermediaries including MSBs. It also explains that Cyber Insurance Companies (CICs) and Digital Forensic and Incident Response (DFIR) companies can play a role in facilitating ransomware-related money laundering. CICs issue policies designed to mitigate the victim’s losses from a variety of cyber incidents, such as data breaches, business interruption and network damage. CICs may reimburse policyholders for particular remediation services including the use of DFIRs, if needed. As part of incident remediation, victims may hire a DFIR company to negotiate with the cybercriminal, facilitate payment to the cybercriminal and investigate the source of the cybersecurity breach. The advisory advises, however, that facilitating these types of payments to cybercriminals could constitute a money transmission that would give rise to the obligation to be registered with FinCEN as an MSB, as well as the attendant obligation to implement an AML compliance program that includes the ability to file SARs.
FinCEN states that it will take action against entities and individuals engaged in such money transmissions or other MSB activities if they do not register with FinCEN or comply with AML obligations.
The advisory lists several circumstances that, if identified by financial institutions, should serve as red flag indications of potential ransomware-associated money laundering. These red flags include:
When circumstances warrant the filing of a SAR, the advisory is very specific about how fields on the SAR report should be filled out to ensure a that the enforcement agencies appreciate the connection between the suspicious activity being reported and ransomware-related activity. In particular, financial institutions should select SAR field 42 (cyber event) as the associated suspicious activity type, as well as select SAR field 42z (cyber event - other) while including “ransomware” as a keyword in SAR field 42z, to indicate a connection between the suspicious activity being reported and possible ransomware activity. Additionally, financial institutions should include any relevant technical cyber indicators related to the ransomware activity and associated transactions within the available structured cyber event indicator SAR fields 44(a)-(j), (z).
If you have any questions related to this guidance or issues associated with ransomware more broadly please feel free to contact the authors of this update.
Publication
Recent tariffs and other trade measures have transformed the international trade landscape, impacting almost every sector, region and business worldwide.
Subscribe and stay up to date with the latest legal news, information and events . . .
© Norton Rose Fulbright LLP 2025