thewayne: (Default)
I've posted about this guy before. When he wasn't able to get a good enough return from the therapy center for hacking them and stealing the files, he started trying to extort the patients to prevent their therapy records from being made public. He was finally convicted and received six years, three months in prison. Prosecution wanted a minimum of seven years, however he will be paying restitution and he will be held in prison while he goes through the appeals process, so they're satisfied.

https://krebsonsecurity.com/2024/04/man-who-mass-extorted-psychotherapy-patients-gets-six-years/
thewayne: (Default)
It was a good week for cybersecurity people!

The first outfit was known as Trigona and was famous for ransom and reveal: pay up or your data is going to be published. They were infiltrated by a group that claims allegiance with Ukrainian. Over the course of several days, they copied all of the data from ten servers then trashed them and defaced their public web server. AND their infrastructure was hidden behind Onion networking! Some very good work done by the attackers. They say all the information is going to be handed over to the appropriate authorities.

The second outfit, Ragnar Locker, was taken down by Interpol and other authorities, raids were conducted in Spain, Czechia, and Latvia. Ragnar is a Ransomware As A Service operation, renting their software to other operations who attack companies then split proceeds with Ragnar. Arrests were made, servers were taken down.

https://arstechnica.com/security/2023/10/two-ransomware-gangs-knocked-out-of-commission-in-a-single-week/
thewayne: (Default)
It's an interesting attack. Once infected, the malware sits there. It contacts a control server and asks permission to attack. When permission is granted, it goes into the Windows Registry and makes changes to prevent Remote Desktop from contacting the computer, so remote administrators can't get into the PC and try to stop the attack. Pretty clever move, that. Then it stops database services so that databases are available. Normally database services lock their databases so those files can't be wiped, stopping the services make them vulnerable.

THEN the wiper launches! It poses as a ransomware attack, launching a pseudo-random number generator, overwriting the files with gibberish and giving them a .cry extension, thus it is now known as the Cry Wiper. The random gibberish makes it look like the file is encrypted, but analysis of the code reveals that it's a random number generator, meaning that even if you pay the demanded 0.5 Bitcoin ransom, you're never getting anything back.

It's common in ransomware attacks to change the extension of the file so people can recognize that they've been compromised and the files are no longer what they were.

Another clever thing about this is that it automatically excludes program and system files: com, exe, dll, etc., so the computer will continue to run perfectly normally, but no data will survive. The articles that I've read don't mention if this will crawl across network shares or seek elevated access privileges, but they weren't very deep articles.

A similar program struck Ukraine earlier this year, probably launched by Russian hacker group(s).

No attribution to this attack has been found. Since no ransomware can be collected, even though a Bitcoin digital wallet is provided, that's probably a dead trail.

https://arstechnica.com/information-technology/2022/12/never-before-seen-malware-is-nuking-data-in-russias-courts-and-mayors-offices/

https://it.slashdot.org/story/22/12/03/0044234/new-crywiper-data-wiper-targets-russian-courts-mayors-offices
thewayne: (Default)
The U.S. government are offering up to a $10,000,000 reward for info leading to the arrest of key members of the group! $5mil for affiliate members!

Recently a member was arrested in Poland and $6mil of cryptocurrency was recovered. He's in prison awaiting extradition to the USA!

The wheels of justice may grind slowly, but they grind exceedingly fine.

Krebs is learning that it seems any organization that is ten years old starts getting really lax about their internal cybersecurity. These guys were brought down because they didn't compartmentalize their hacker identities from their social media identities. People linked them, reported them to the authorities, and now they're behind bars!

https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/
thewayne: (Default)
This is quite amusing and interesting.

Their bitcoin stash was seized and emptied. Their DDoS operation was seized: they used this to throw denial of service attacks at people whom they'd already hit with ransomware attacks who weren't paying up. Basically their infrastructure was taken from them and destroyed. No information who did this.

They closed up shop, and if I'm reading this article correctly, they released the decrpyt keys to everyone they'd encrypted but who hadn't paid yet.

Very strange things afoot.

One thing the article mentions is the "REvil Ransomware-as-a-service Platform." That's right, if you have the connections and the money, you can become a ransomware entrepreneur and go around perpetuating this shit and become rich and infamous. It is possible that the REvil people said 'No, you do not screw with major infrastructure, bad boys!' and had the means to tear them apart, or dropped a dime to law enforcement and turned them in. REvil is a pretty big org, and they certainly have the means to tear apart one of their franchise operators.

https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/


Colonial paid a $5,000,000 ransom shortly after the incident happened to try and restore service as soon as they could. And they received a working de-crypt key promptly. The problem is, with the high levels of encryption that these ransomware packages apply, decryption of vast levels of data take a long time, so Colonial also started doing restores from backup while also decrypting, attacking the problem from two points at the same time.

There are multiple problems with ransomware, paying it or not. If you don't pay it, you have to rebuild your infrastructure from scratch and hope your backups are good. Smart people in IT have a saying that we're fond of that that if you don't test your backups by doing a restore, then you don't have a backup. And a lot of companies that get hit by ransomware all of a sudden find out that they don't have backups. I worked with one such company that got hit by ransomware: turns out they'd been having backup problems and just couldn't be bothered trying to resolve them, too busy.

Plus, the criminals have developed another layer to their model. They have to infiltrate your network to place the encryption software and launch it. So while they're there, they hit your email server and documents directories and exfiltrate that information, they also look for corporate secret stuff like blueprints and things. Lots of companies have secrets that they would rather were not exposed to the light of day, like that $1,000 gadget that everyone is buying that only costs $75 to make, or the CEO's perversity for 14 year olds? Things like that. So if the company doesn't pay the ransom and starts rebuilding, they then come back and double the ransom demand and threaten to dump this dirty laundry in the open press.

And then there's the problem with those that pay and become the victim of poor-quality criminals. They don't hear from the criminals and don't receive a decrypt key or program, or the key will not work, or they demand another ransom and it turns into escalating extortion.

The REvil people try to keep the criminals using their service operating professionally so that if you're hit by a REvil ransomware infection, you know that if you pay the ransom, you'll get your data back. I think it's a good chance that REvil took down DarkSide or dropped a dime and provided critical information for DarkSide's downfall.

We might know some day.


I'm not writing a lot about cybercrime because it's just too damn common. I could spend all my waking hours writing about it, just like I could spend all my time writing about politics. It's just not worth it. I quit working in IT, and I'm staying quit, though I'm still keeping abreast of some of the better blogs and web sites.
thewayne: (Default)
Early ransomware attacks were simple extortion. You open an infected email attachment, and it either contained the malware or downloaded the malware and it exploited your network and encrypted the network and demanded a ransom to get your data back.

Then the attackers got more sophisticated and hands-on involved.

The malware loaded a bunch of zero-day exploits, that is, attacks that were unknown or unpatched by operating system vendors, and thus undefended. This allowed the attackers full access to networks for an extended period of time. So they found valuable data, exfiltrated it to their GQ, THEN encrypted the servers that they had control over and demanded a ransom.

And part of the ransom demand was that you pay us to get your data back or you might not only face loss of your information, but you might also face us posting your data online or selling it to competitors.

The normal defense against ransomware has been good procedures for backups and recovery, and we used to think that was good enough. We could get our systems back: reformat, install a new copy of the operating system, patch, reload the data. Time consuming, but it's actually faster than unencrypting files because encryption/decryption is a very time-consuming process.

But the criminals are now posting internal corporate documents on public web servers, saying Company X didn't pay, they rebuilt their infrastructure without giving us a dime so here's their information.

This is obviously going to have potentially serious GDPR consequences in Europe, we'll see how it plays out over here, especially if no customer notification took place and if credit card information was involved.

https://krebsonsecurity.com/2019/12/ransomware-gangs-now-outing-victim-businesses-that-dont-pay-up/

January 2026

S M T W T F S
    1 23
45678910
11121314151617
18192021222324
25262728293031

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 3rd, 2026 12:21 pm
Powered by Dreamwidth Studios