Skip naar inhoud

Ransomware gangs seek people skills for negotiations

Wilt u deze bijdrage aanbevelen? Dat kan via:

The process of negotiating a ransomware payment is delicate, and cyber criminal organisations are prepared to offer good terms to those with the right skillsets
The increasing sophistication of the cyber criminal underground is now reflected in how ransomware operations put together their crews, seeking out specialist talent and skillsets. Indeed, some gangs are coming to resemble corporations, with diversified roles and outsourced negotiations with victims, according to new research published by Kela, a provider of threat intelligence services.Kela analyst Victoria Kivilevich and other members of the team spent over a year monitoring the dark web cyber job ecosystem, and quickly established the existence of four main areas of specialization:

  • Coding, or acquiring malware with needed capabilities.
  • Infecting targeted victims.
  • Maintaining access to victim systems, and exfiltrating and processing their data.
  • Monetization, cashing out, selling, or otherwise monetizing the stolen data.

Each of these stages involves various malicious activities where various skills may come in handy, and Kivilevich said her team had found that when looking specifically at the ransomware supply chain, many actors are concentrating on the extraction niche, focusing on escalating their privileges within the compromised network, and the monetization niche, where actors are involved in extracting ransoms during victim negotiations.

People with the appropriate – and not necessarily technical – skillsets to succeed in ransom negotiations are particularly valued, Kela found. “We observed multiple posts [on the dark web] describing a new role in the ransomware ecosystem, negotiators, whose purpose is to force the victim to pay a ransom using insider information and threats,” said Kivilevich.

“Victims started using negotiators – while a few years ago there was no such profession, now there is a demand for negotiating services. Ransomware-negotiation specialists partner with the insurance companies and have no lack of clients. Ransom actors had to up their game as well, in order to make good margins.

“As most ransom actors probably are not native English speakers, more delicate negotiations – specifically around very high budgets and surrounding complex business situations – required better English. When REvil’s representative was looking for a ‘support’ member of the team to hold negotiations, they specifically mentioned ‘conversational English’ as one of the demands. This is not a new case: actors are interested in native English speakers to use for spear-phishing campaigns.”

Kivilevich found several threads on Russian-speaking underground forums where cyber criminals were looking for negotiators and discussing their work.

In the image below – which Kela translated from Russian using Google services – a threat actor who has already established persistence on the network of a victim in Saudi Arabia appears to call for an insider, or someone with contacts, at Middle Eastern cybersecurity companies who can hand over contact details for the victim’s IT managers in order to conduct negotiations. Remuneration in this case would be between $1m and $5m (£720,000 to £3.6m, or €840,000 to €4.22m), or likely about 20% of the ransom.

And just as a legitimate organisation might book a contractor who turns out to be a bad fit, ransomware gangs can also make bad hiring decisions, and on some of the forums, Kela found evidence of disagreements between ransomware gangs and their hired guns (see image below).

In one documented instance, miscommunication between a Conti affiliate and a hired negotiator blew up into an outright dispute in the attempted April 2021 extortion of the Broward County Public School District in Florida.

The negotiator claimed that they had insider information that would force the victim to pay up – they had demanded $40m, in itself a massive overreach – but then accused Conti’s affiliate of meddling in the negotiations and running their efforts. Conti countered by accusing the negotiators of behaving unprofessionally.

Others then weighed in on the forum with their experiences, with a representative of REvil – currently at the centre of the unfolding Kaseya incident – accusing the negotiator of being a scammer.

Kela’s report goes into more detail about some specialist roles ransomware operators are prepared to pay big bucks for, such as access brokers, intrusion specialists (or penetration testers), and owners of botnets for associated distributed denial of service (DDoS) attacks. It can be read in full here.

Lees ook:

Wat wil en wenst de ontwikkelaar?

In een krappe ict-arbeidsmarkt is het voor werkgevers interessant te weten wat er onder ontwikkelaars leeft. Bedrijven die de juiste tools bieden, hebben een streepje voor. Een internationaal onderzoek onder ruim zeventigduizend ontwikkelaars uit de Stack Overflow-community geeft inzicht in de trends. Dit rapport is bij recruiters dan ook niet onopgemerkt gebleven. Ze krijgen zo een beeld van hoe developers leren en meer kennis vergaren, welke tools ze gebruiken en waaraan ze behoefte hebben.

TNO: Europa kan tech-overmacht VS en China doorbreken

Zet vol in op de ontwikkeling van 6G, maak Gaia-X volwassen, loop voorop met edge computing en omarm open technologie. Dit zijn enkele aanbevelingen van TNO om in Europa de overheersing van Big Tech en Chinese (5G-)bedrijven te doorbreken.

Subpostmaster campaigning forces government to set up compensation scheme and make interim payments

Subpostmaster campaign group is a step closer to achieving what it was originally set up to do as government launches compensation scheme for its members who did not receive fair payouts

Advies: wacht met 3,5 GHz tot Inmarsat weg is

Het duurt waarschijnlijk tot eind 2023 voordat de 3,5-GHz-frequentieband beschikbaar komt voor openbare mobiele-communicatiediensten. Er is weliswaar veel vraag naar extra frequentieruimte, maar op de daarvoor afgesproken 3,5-GHz-band kan dat storen met noodoproepen van de lucht- en zeevaart. Het ministerie krijgt het advies te wachten totdat satellietbedrijf Inmarsat is verhuisd van het Friese Burum naar Griekenland.

Na sase komt sse (security service edge)

Security service edge (sse) is de evolutie van het sase-framework van Gartner. Door de letter ‘A’ (voor ’access) te verwijderen, wordt duidelijk dat het netwerk niet langer wordt beschouwd als onderdeel van een beveiligingsoplossing. Het is slechts het mechanisme dat de datastromen naar het security- en controleplatform transporteert.

UK tech has 2.8% gender ‘wage gap’, says Hired

The wage offered to women for tech jobs in the UK is 2.8% less than offered to male counterparts – a larger gap than in the US and Canada, says Hired

Wilt u deze bijdrage aanbevelen? Dat kan via:

Klaar voor de beste oplossing voor uw IT & ICT-situatie?

Ik heb mijn wachtwoord gewijzigd in “onjuist.” Dus wanneer ik vergeet wat het is, zal de computer zeggen: “Uw wachtwoord is onjuist.”