Skip naar inhoud

Ransomware gangs seek people skills for negotiations

Wilt u deze bijdrage aanbevelen? Dat kan via:

The process of negotiating a ransomware payment is delicate, and cyber criminal organisations are prepared to offer good terms to those with the right skillsets
The increasing sophistication of the cyber criminal underground is now reflected in how ransomware operations put together their crews, seeking out specialist talent and skillsets. Indeed, some gangs are coming to resemble corporations, with diversified roles and outsourced negotiations with victims, according to new research published by Kela, a provider of threat intelligence services.Kela analyst Victoria Kivilevich and other members of the team spent over a year monitoring the dark web cyber job ecosystem, and quickly established the existence of four main areas of specialization:

  • Coding, or acquiring malware with needed capabilities.
  • Infecting targeted victims.
  • Maintaining access to victim systems, and exfiltrating and processing their data.
  • Monetization, cashing out, selling, or otherwise monetizing the stolen data.

Each of these stages involves various malicious activities where various skills may come in handy, and Kivilevich said her team had found that when looking specifically at the ransomware supply chain, many actors are concentrating on the extraction niche, focusing on escalating their privileges within the compromised network, and the monetization niche, where actors are involved in extracting ransoms during victim negotiations.

People with the appropriate – and not necessarily technical – skillsets to succeed in ransom negotiations are particularly valued, Kela found. “We observed multiple posts [on the dark web] describing a new role in the ransomware ecosystem, negotiators, whose purpose is to force the victim to pay a ransom using insider information and threats,” said Kivilevich.

“Victims started using negotiators – while a few years ago there was no such profession, now there is a demand for negotiating services. Ransomware-negotiation specialists partner with the insurance companies and have no lack of clients. Ransom actors had to up their game as well, in order to make good margins.

“As most ransom actors probably are not native English speakers, more delicate negotiations – specifically around very high budgets and surrounding complex business situations – required better English. When REvil’s representative was looking for a ‘support’ member of the team to hold negotiations, they specifically mentioned ‘conversational English’ as one of the demands. This is not a new case: actors are interested in native English speakers to use for spear-phishing campaigns.”

Kivilevich found several threads on Russian-speaking underground forums where cyber criminals were looking for negotiators and discussing their work.

In the image below – which Kela translated from Russian using Google services – a threat actor who has already established persistence on the network of a victim in Saudi Arabia appears to call for an insider, or someone with contacts, at Middle Eastern cybersecurity companies who can hand over contact details for the victim’s IT managers in order to conduct negotiations. Remuneration in this case would be between $1m and $5m (£720,000 to £3.6m, or €840,000 to €4.22m), or likely about 20% of the ransom.

And just as a legitimate organisation might book a contractor who turns out to be a bad fit, ransomware gangs can also make bad hiring decisions, and on some of the forums, Kela found evidence of disagreements between ransomware gangs and their hired guns (see image below).

In one documented instance, miscommunication between a Conti affiliate and a hired negotiator blew up into an outright dispute in the attempted April 2021 extortion of the Broward County Public School District in Florida.

The negotiator claimed that they had insider information that would force the victim to pay up – they had demanded $40m, in itself a massive overreach – but then accused Conti’s affiliate of meddling in the negotiations and running their efforts. Conti countered by accusing the negotiators of behaving unprofessionally.

Others then weighed in on the forum with their experiences, with a representative of REvil – currently at the centre of the unfolding Kaseya incident – accusing the negotiator of being a scammer.

Kela’s report goes into more detail about some specialist roles ransomware operators are prepared to pay big bucks for, such as access brokers, intrusion specialists (or penetration testers), and owners of botnets for associated distributed denial of service (DDoS) attacks. It can be read in full here.

Lees ook:

Nederland digi-vaardigst, België gemiddeld

Nergens in Europa zijn relatief meer inwoners bedreven in het gebruik van internet, computers en software dan in Nederland en Finland. Beide landen voeren de ranglijst aan van digitale vaardigheden. België scoort gemiddeld. Dit blijkt uit onderzoek door het Centraal Bureau voor de Statistiek (CBS) en Eurostat.

Security-specialist loopt verhoogd risico op burn-out

Het merendeel van securityprofessionals zegt harder te werken dan ooit, en het werk desalniettemin niet af te krijgen. Ook kan het werk stressvol zijn. Tegelijkertijd biedt cybersecurity een prachtig loopbaanperspectief.

Rekenkamer signaleert risico’s bij algoritmes

De Algemene Rekenkamer heeft een toetsingskader ontwikkeld om algoritmes te beoordelen. Het orgaan baseert zich op een studie naar negen algoritmes die bij de overheid in gebruik zijn; slechts drie voldeden aan alle aspecten. Staatssecretaris Digitalisering Van Huffelen gebruikt de bevindingen om digitale voorschriften te verbeteren.

Helft bedrijven vertrouwt op oude securitystrategie

Uit een studie van het Ponemon Institute uit de Verenigde Staten blijkt dat een aanzienlijk deel van de bedrijven nog steeds beveiligingsprocessen en -beleid van vóór de coronapandemie gebruikt, waardoor hun veiligheid in gevaar komt.

Two-thirds of UK organisations defrauded since start of pandemic

Nearly two out of three UK companies say they have experienced some form of fraud or economic crime in the past two years, according to a report

Is de Franse reparatie-index een jaar later zijn beloftes nagekomen?

De Franse reparatie-index is op 1 januari 2021 in werking getreden. Een wereldprimeur, het is van toepassing op 5 productcategorieën: smartphones, laptops, wasmachines, tv's en grasmaaiers.

Wilt u deze bijdrage aanbevelen? Dat kan via:

Klaar voor de beste oplossing voor uw IT & ICT-situatie?

Ik heb mijn wachtwoord gewijzigd in “onjuist.” Dus wanneer ik vergeet wat het is, zal de computer zeggen: “Uw wachtwoord is onjuist.”