Security Market Segment LS
Wednesday, 12 August 2020 09:28

Ransomware gangs using social pressure to extort victims: Sophos researcher Featured

By
John Shier: "It’s still too early to determine if this form of social pressure will be more profitable than more traditional methods." John Shier: "It’s still too early to determine if this form of social pressure will be more profitable than more traditional methods." Courtesy Sophos

The actors behind the various Windows ransomware packages changed their tactics to prise money out of their victims' hands in October last year, but it remains to be seen whether their use of social pressure will be more profitable than methods used earlier, a researcher from global security firm Sophos has observed.

Senior security expert John Shier said in a blog post, the fourth in a series published by the company under the title The realities of ransomware, that the new social method adopted by ransomware gangs had led to a new era where social pressure and shaming was being used to improve the attackers' bottom line.

iTWire has so far covered three of the blog posts, one last week and two others on Monday and Tuesday.

Shier pointed out that when ransomware was in its early days, the process was entirely transactional.

"You received an unsolicited email, clicked on a link or opened an attachment, and your computer eventually ran the ransomware binary which encrypted all of your user-generated files," Shier said. "The process of recovery was fairly straightforward. You either recovered your files from back-up — after doing a full re-image — or you sent bitcoin to the criminals in exchange for the decryption key.

"In time, the criminals added the ability to communicate with them and things got a little more personal. These communications were mostly under the auspices of support. Not only could the criminals increase their reputation as ‘trustworthy’ merchants, but it also gave some individuals the ability to negotiate payment terms."

But then things changed in October 2019, when a group going by the moniker Shadow Kill Hackers attacked the city of Johannesburg and claimed they had stolen data from the compromised systems.

Said Shier: "The difference here is that the attackers didn’t encrypt any files. In this purely social attack, the criminals threatened to release financial and personal data of Johannesburg’s citizens if payment (4 BTC) was not made by the deadline. The city rebuffed the ransom demand and the attackers were silent. It took less than a month for this new tactic to catch the attention of more serious ransomware gangs."

He said the first ransomware group to start using this tactic, of steal and share as additional extortion pressure, was Maze.

"The first such incident occurred in November 2019 when the Maze crew released a portion of a victim's stolen data in a show of force and added social pressure for the company’s lack of payment," Shier said.

"Since then we’ve seen the Maze operators continue this behaviour and other prominent ransomware gangs have joined them."

Among the ransomware groups that have adopted this tactic are Ako, Avaddon, Clop, DoppelPaymer, Nemty, Nefilim, REvil (Sodinokibi), Netwalker, Pysa (Mespinoza), Ragnar Locker, Sekhmet and Snatch.

Shier said that it was not uncommon these days to hear of a ransomware victim being extorted into paying a ransom because they feared data exposure.

"We’ve seen some criminals use their total access to an organisation’s compromised systems to pit employees against their own executives and IT department by threatening to release stolen employee data if the company did not engage with the criminals and negotiate payment," he said.

"While it’s still too early to determine if this form of social pressure will be more profitable than more traditional methods, it has heralded a new era in ransomware where social pressure and shaming is being used to increase the attackers’ bottom line."


Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.

CLICK HERE!

WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.

REGISTER HERE!

BACK TO HOME PAGE
Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments