This ransomware gang lets you rummage around their stolen data
Date:
Wed, 13 Jul 2022 11:12:20 +0000
Description:
Some leak sites now come with search engines, allowing crooks to find passwords easier.
FULL STORY ======================================================================
We appear to have reached the next stage in the evolution of ransomware , as operators now allow people to search through the files stolen from companies that declined to pay up.
Multiple ransomware operators are reportedly now adding the feature to their leak sites - and while some have done a poor job, as their engines didnt exactly work as intended, others appear to have successfully pulled it off.
In the case of BlackCat (AKA ALPHV), not only does the search engine work,
but the files were also indexed, allowing visitors to search by specific keywords or file types, making it easier for other cybercriminals to find sensitive data, and possibly attack other firms with malware and ransomware, as well. Finding passwords faster
LockBit is another threat actor that introduced the same functionality to its website, and although its not as advanced as BlackCats, it still works relatively well. Karakurts search engine, however, was shown as malfunctioning.
By allowing victims, other threat actors, and anyone else, to quickly and easily go through terabytes of stolen data, ransomware operators want to
exert additional pressure on the victim, to have them pay the ransom.
If the victims client, or customer, sees their data exposed to the public in this way, they might try and persuade them to pay the ransom and have that data removed from the web as soon as possible. Read more
Here's how to protect your online identities from theft
One of the most dastardly ransomware strains has received a Rust-flavored
upgrade
Cybersecurity watchdog asks lawyers for help in the fight against
ransomware
This is just another step, in a long line of moves cybercriminals have been pulling, since the inception of ransomware, all with the goal of
incentivizing payment.
In the early days, when businesses declined to pay up, threat actors started both encrypting and stealing data, threatening to release it to the public.
When that, too, failed to convince the victims, they started bullying them with phone calls and threatening emails. In some cases, ransomware attacks
are also followed up with distributed denial of service (DDoS) attacks, clogging the front-end with bogus traffic, and paralyzing the business both from the customer-facing side, as well as from the back-office. Protect your networks from bogus traffic with the best firewalls around
Via: BleepingComputer
======================================================================
Link to news story:
https://www.techradar.com/news/this-ransomware-gang-lets-you-rummage-around-th eir-stolen-data/
--- Mystic BBS v1.12 A47 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)