{"id":6406,"date":"2021-07-08T14:44:25","date_gmt":"2021-07-08T14:44:25","guid":{"rendered":"http:\/\/TheNextWeb=1359800"},"modified":"2021-07-08T14:44:25","modified_gmt":"2021-07-08T14:44:25","slug":"most-wanted-the-top-5-online-crime-gangs-running-ransomware","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=6406","title":{"rendered":"Most wanted: The top 5 online crime gangs running ransomware"},"content":{"rendered":"\n<p><em>On the internet, nobody knows you\u2019re a dog!<\/em><\/p>\n<p>These words from Peter Steiner\u2019s <a href=\"https:\/\/www.washingtonpost.com\/blogs\/comic-riffs\/post\/nobody-knows-youre-a-dog-as-iconic-internet-cartoon-turns-20-creator-peter-steiner-knows-the-joke-rings-as-relevant-as-ever\/2013\/07\/31\/73372600-f98d-11e2-8e84-c56731a202fb_blog.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">famous cartoon<\/a> could easily be applied to the recent <a href=\"https:\/\/www.nzherald.co.nz\/nz\/worldwide-ransomware-attack-st-peters-college-and-10-other-schools-hit-by-us-cyber-attack\/JACHAD3OPGUOF7ZIF4PJXDPICA\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ransomware attack<\/a> on Florida-based software supplier Kaseya.<\/p>\n<p>Kaseya provides software services to thousands of clients around the world. It\u2019s estimated between <a href=\"https:\/\/www.itnews.com.au\/news\/kaseya-boss-says-up-to-1500-businesses-affected-by-ransomware-attack-566942\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">800 and 1,500 medium to small businesses<\/a> may be impacted by the attack, with the hackers demanding US$50 million&nbsp;(<a href=\"https:\/\/thewest.com.au\/news\/crime\/ransomware-hackers-lower-demand-to-us50m-c-3320330\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">lower than the previously reported US$70 million<\/a>) in exchange for restoring access to data being held for ransom.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\" readability=\"11.822834645669\">\n<p lang=\"en\" dir=\"ltr\">Hackers behind this attack, REvil <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">#ransomware<\/a>-as-a-service (RaaS) group, swiftly lowered the asking price to $50 million, suggesting a willingness to negotiate their demands in return for a lesser amount.<\/p>\n<p>\u2014 The Hacker News (@TheHackersNews) <a href=\"https:\/\/twitter.com\/TheHackersNews\/status\/1412336467490209796?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">July 6, 2021<\/a><\/p>\n<\/blockquote>\n<p>The global ransomware attack has been <a href=\"https:\/\/www.cbsnews.com\/news\/kaseya-atttack-biggest-known-ransomware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">labeled<\/a> the biggest on record. Russian cybercriminal organization REvil is the alleged culprit.<\/p>\n<p>Despite its notoriety, nobody really knows what REvil is, what it\u2019s capable of, or why it does what it does \u2014 apart from the immediate benefit of huge sums of money. Also, ransomware attacks often involve vast distributed networks, so it\u2019s not even certain the individuals involved would <a href=\"https:\/\/theconversation.com\/inside-a-ransomware-attack-how-dark-webs-of-cybercriminals-collaborate-to-pull-them-off-163015\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">know each other<\/a>.<\/p>\n<p>Ransomware attacks are <a href=\"https:\/\/theconversation.com\/the-increase-in-ransomware-attacks-during-the-covid-19-pandemic-may-lead-to-a-new-internet-162490\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">growing exponentially<\/a> in size and ransom demand \u2014 changing the way we operate online. Understanding who these groups are and what they want is critical to take&nbsp;them down.<\/p>\n<p>Here, we list the top five most dangerous criminal organizations currently online. As far as we know, these rogue groups aren\u2019t backed or <a href=\"https:\/\/cybernews.com\/editorial\/the-worlds-most-dangerous-state-sponsored-hacker-groups\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sponsored by any state<\/a>.<\/p>\n<h2>DarkSide<\/h2>\n<p>DarkSide is the group behind the <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Colonial Pipeline<\/a> ransom attack in May, which shut down the US Colonial Pipeline\u2019s fuel distribution network, triggering gasoline shortage concerns.<\/p>\n<p>The group seemingly first emerged in August last year. It targets <a href=\"https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">large companies<\/a> that will suffer from any disruption to their services \u2014 a key factor, as they\u2019re then more likely to pay a ransom. Such companies are also more likely to have <a href=\"https:\/\/www.reuters.com\/technology\/after-colonial-attack-energy-companies-rush-secure-cyber-insurance-2021-05-28\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cyber insurance<\/a> which, for criminals, means easy money-making.<\/p>\n<p>DarkSide\u2019s business model is to offer a <a href=\"https:\/\/securityboulevard.com\/2021\/05\/darkside-offered-ransomware-as-a-service-before-pipeline-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ransomware service<\/a>. In other words, it carries out ransomware attacks on behalf of other, hidden perpetrator\/s so they can lessen their liability. The executor and perpetrator then share profits.<\/p>\n<p>Groups that offer cybercrime-as-a-service also provide online forum communications to support others who may want to improve their cybercrime skills.<\/p>\n<p>This might involve teaching someone how to combine <a href=\"https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">distributed denial-of-service (DDoS) and ransomware<\/a> attacks, to put extra pressure on negotiations. The ransomware would prevent a business from working on past and current orders, while a DDoS attack would block any new orders.<\/p>\n<h2>REvil<\/h2>\n<p>The ransomware-as-a-service group REvil is currently making headlines due to the ongoing Kaseya incident, as well as another recent attack on <a href=\"https:\/\/www.zdnet.com\/article\/fbi-attributes-jbs-ransomware-attack-to-revil\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">global meat processing company JBS<\/a>. This group has been particularly active in 2020-2021.<\/p>\n<figure class=\"align-center \" readability=\"2\">\n<p><figure class=\"post-image post-mediaBleed aligncenter\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/409893\/original\/file-20210706-25-cdxsbk.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt width=\"650\" height=\"305\" class=\"js-lazy\"><figcaption><a href=\"https:\/\/thenextweb.com\/news\/top-5-online-crime-gangs-ransomware-syndication#\" data-url=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Feditorial.thenextweb.com%2Ftech%2F2021%2F07%2F08%2Ftop-5-online-crime-gangs-ransomware-syndication%2F&amp;via=thenextweb&amp;related=thenextweb&amp;text=Check out this picture on: REvil\u2019s HappyBlog web site showing US$70m ransom demand. Author provided\" data-title=\"Share REvil\u2019s HappyBlog web site showing US$70m ransom demand. Author provided on Twitter\" data-width=\"685\" data-height=\"500\" class=\"post-image-share popitup\" title=\"Share REvil\u2019s HappyBlog web site showing US$70m ransom demand. Author provided on Twitter\"><i class=\"icon icon--inline icon--twitter--dark\"><\/i><\/a>REvil\u2019s HappyBlog web site showing US$70m ransom demand. Author provided<\/figcaption><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/409893\/original\/file-20210706-25-cdxsbk.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt width=\"650\" height=\"305\" class><\/noscript><\/figure><figcaption><span class=\"attribution\"><\/span><\/figcaption><\/p>\n<\/figure>\n<p>In April, REvil stole technical data on unreleased Apple products from Quanta Computer, a Taiwanese company that assembles Apple laptops. A <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/apr\/22\/ransomware-hackers-steal-plans-upcoming-apple-products\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ransom of US$50 million<\/a> was demanded to prevent public release of the stolen data. It hasn\u2019t been revealed whether or not this money was paid.<\/p>\n<h2>Clop<\/h2>\n<p>The ransomware <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/clop-ransomware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Clop<\/a> was created in 2019 by a financially motivated group responsible for yielding <a href=\"https:\/\/krebsonsecurity.com\/2021\/06\/ukrainian-police-nab-six-tied-to-clop-ransomware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">half a billion US dollars<\/a>.<\/p>\n<p>The Clop group\u2019s specialty is \u201cdouble-extortion\u201d. This involves targeting organizations with ransom money in exchange for a decryption key that will restore the organization\u2019s access to stolen data. However, targets will then have to pay extra ransom to not have the data released publicly.<\/p>\n<p>Historical examples reveal that organizations which pay a ransom once are more likely to pay again in the future. So hackers will tend to target the same organizations again and again, asking for more money each time.<\/p>\n<figure class=\"align-center \" readability=\"2\">\n<p><figure class=\"post-image post-mediaBleed aligncenter\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/409895\/original\/file-20210706-13-1ammbxm.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt width=\"614\" height=\"577\" class=\"js-lazy\"><figcaption><a href=\"https:\/\/thenextweb.com\/news\/top-5-online-crime-gangs-ransomware-syndication#\" data-url=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Feditorial.thenextweb.com%2Ftech%2F2021%2F07%2F08%2Ftop-5-online-crime-gangs-ransomware-syndication%2F&amp;via=thenextweb&amp;related=thenextweb&amp;text=Check out this picture on: ClopLeaks website showing directly downloadable ransom files. Author provided\" data-title=\"Share ClopLeaks website showing directly downloadable ransom files. Author provided on Twitter\" data-width=\"685\" data-height=\"500\" class=\"post-image-share popitup\" title=\"Share ClopLeaks website showing directly downloadable ransom files. Author provided on Twitter\"><i class=\"icon icon--inline icon--twitter--dark\"><\/i><\/a>ClopLeaks website showing directly downloadable ransom files. Author provided<\/figcaption><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/409895\/original\/file-20210706-13-1ammbxm.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt width=\"614\" height=\"577\" class><\/noscript><\/figure><figcaption><\/figcaption><\/p>\n<\/figure>\n<h2>Syrian Electronic Army<\/h2>\n<p>Far from a typical cybercrime gang, the Syrian Electronic Army has been launching online attacks since 2011 to promote political propaganda. With this motive, they have been dubbed a <a href=\"https:\/\/www.akamai.com\/uk\/en\/resources\/syrian-electronic-army.jsp\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">hactivist<\/a> group.<\/p>\n<p>While the group has <a href=\"https:\/\/opennet.net\/emergence-open-and-organized-pro-government-cyber-attacks-middle-east-case-syrian-electronic-army\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">links<\/a> with Bashar al-Assad\u2019s regime, it\u2019s more likely made up of <a href=\"https:\/\/cvir.st-andrews.ac.uk\/articles\/10.15664\/jtr.1294\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">online vigilantes<\/a> trying to be <a href=\"https:\/\/opencanada.org\/new-face-syrian-electronic-army\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">media auxiliary<\/a> for the Syrian army.<\/p>\n<p>Their technique is to distribute <a href=\"https:\/\/www.bbc.com\/news\/world-middle-east-22287326\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">fake news<\/a> through reputable sources. In 2013, a single tweet sent by them from the official account of the Associated Press, the world\u2019s leading news agency, had the effect of <a href=\"https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2013\/04\/23\/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">wiping billions<\/a> from the stock market.<\/p>\n<figure class=\"align-center \" readability=\"2\">\n<p><figure class=\"post-image post-mediaBleed aligncenter\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/409836\/original\/file-20210706-13-w5mk2t.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt width=\"604\" height=\"303\" class=\"js-lazy\"><figcaption><a href=\"https:\/\/thenextweb.com\/news\/top-5-online-crime-gangs-ransomware-syndication#\" data-url=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Feditorial.thenextweb.com%2Ftech%2F2021%2F07%2F08%2Ftop-5-online-crime-gangs-ransomware-syndication%2F&amp;via=thenextweb&amp;related=thenextweb&amp;text=Check out this picture on: The fake AP tweet from the Syrian Electronic Army. www.theatlantic.com\/\" data-title=\"Share The fake AP tweet from the Syrian Electronic Army. www.theatlantic.com\/ on Twitter\" data-width=\"685\" data-height=\"500\" class=\"post-image-share popitup\" title=\"Share The fake AP tweet from the Syrian Electronic Army. www.theatlantic.com\/ on Twitter\"><i class=\"icon icon--inline icon--twitter--dark\"><\/i><\/a>The fake AP tweet from the Syrian Electronic Army. www.theatlantic.com\/<\/figcaption><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/409836\/original\/file-20210706-13-w5mk2t.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt width=\"604\" height=\"303\" class><\/noscript><\/figure><figcaption><span class=\"attribution\"><\/span><\/figcaption><\/p>\n<\/figure>\n<p>The Syrian Electronic Army exploits the fact that most people online have a tendency to interpret and react to content with an implicit sense of trust. And they\u2019re a prime example of how the <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17440572.2012.759508?casa_token=8oYWCR5Hos4AAAAA%3Adkm-B8CSG9cg9d6GrvxHY0uGqzzxuD9jeSX43_DsIGkcAz1y-iStjCkWjTipxFcaNO0X9vldSJZLfoQ\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">boundaries<\/a> between crime and terror groups online are less distinct than in the physical world.<\/p>\n<h2>FIN7<\/h2>\n<p>If this list could contain a \u201csuper villain\u201d, it would be FIN7. Another Russian-based group, FIN7 is arguably the most <a href=\"https:\/\/www.wired.com\/story\/fin7-carbanak-hacking-group-behind-a-string-of-big-breaches\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">successful<\/a> online criminal organization of all time. Operating since 2012, it mainly works as a <a href=\"https:\/\/geminiadvisory.io\/fin7-syndicate-hacks-saks-fifth-avenue-and-lord-taylor\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">business<\/a>.<\/p>\n<p>Many of its operations have been undetected for years. Its data breaches have exploited <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/03\/fin7_spear_phishing.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cross-attack<\/a> scenarios, wherein the data breach serves multiple purposes. For example, it may enable extortion through ransom while also allowing the attacker to use data against victims, such as by reselling it to a third party.<\/p>\n<p>In early 2017, FIN7 was alleged to be behind an attack targeting <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/network-security\/fin7-spearphishing-campaign-targets-sec-filings\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">companies providing filings<\/a> to the US Security and Exchange Commission. This confidential information was exploited and used to obtain ransom which was then invested on the stock exchange.<\/p>\n<p>As such, the groups made huge sums of money by trading on confidential information. The <a href=\"https:\/\/www.amf-france.org\/sites\/default\/files\/2020-02\/study-stock-market-cybercrime-_-definition-cases-and-perspectives.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">insider trading<\/a> scheme facilitated by hacking went on for many years \u2014 which is why it\u2019s not possible to quantify the exact amount of economic damage. But it\u2019s estimated to be well over US$1 billion.<\/p>\n<h2>Organized crime vs organized criminals<\/h2>\n<p>When it comes to complex criminal organizations, <a href=\"https:\/\/attack.mitre.org\/techniques\/enterprise\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">techniques<\/a><a href=\"https:\/\/www.trendmicro.com\/vinfo\/au\/security\/news\/cybercrime-and-digital-threats\/ransomware-double-extortion-and-beyond-revil-clop-and-conti\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">evolve<\/a> and <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s12117-018-9342-y\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">motives<\/a> vary.<\/p>\n<p>The way they organize themselves and commit crimes online is very different from your local offline gang. Ransomware can be launched from anywhere in the world, so it\u2019s very difficult to prosecute these criminals. Matters are made even more complicated when several parties coordinate across borders.<\/p>\n<p>It\u2019s no wonder the challenge for law enforcement agencies is significant. It\u2019s crucial that authorities investigating an attack are sure it was indeed perpetrated by who they suspect. But to know this, they need all the help they can get.<\/p>\n<p><em>Article by <a href=\"https:\/\/theconversation.com\/profiles\/roberto-musotto-872263\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Roberto Musotto<\/a>, Research fellow, <a href=\"https:\/\/theconversation.com\/institutions\/edith-cowan-university-720\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Edith Cowan University<\/a>; <a href=\"https:\/\/theconversation.com\/profiles\/brianna-oshea-1142397\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Brianna O\u2019Shea<\/a>, Lecturer, Ethical Hacking and Defense, <a href=\"https:\/\/theconversation.com\/institutions\/edith-cowan-university-720\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Edith Cowan University<\/a>, and <a href=\"https:\/\/theconversation.com\/profiles\/paul-haskell-dowland-382903\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Paul Haskell-Dowland<\/a>, Associate Dean (Computing and Security), <a href=\"https:\/\/theconversation.com\/institutions\/edith-cowan-university-720\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Edith Cowan University<\/a><\/em><\/p>\n<p><em>This article is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/holding-the-world-to-ransom-the-top-5-most-dangerous-criminal-organisations-online-right-now-163977\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original article<\/a>.<\/em><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/top-5-online-crime-gangs-ransomware-syndication\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the internet, nobody knows you\u2019re a dog! These words from Peter Steiner\u2019s famous cartoon could easily be applied to the recent ransomware attack on Florida-based software supplier Kaseya. Kaseya provides software&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6407,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/6406"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6406"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/6406\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/6407"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}