A Closer Look at the DarkSide Ransomware Gang

The FBI confirmed this week that a relatively new ransomware group known as DarkSide is responsible for an attack that caused Colonial Pipeline to shut down 5,550 miles of pipe, stranding countless barrels of gasoline, diesel and jet fuel on the Gulf Coast. Here’s a closer look at the DarkSide cybercrime gang, as seen through their negotiations with a recent U.S. victim that earns $15 billion in annual revenue.

Colonial Pipeline has shut down 5,500 miles of fuel pipe in response to a ransomware incident. Image: colpipe.com

New York City-based cyber intelligence firm Flashpoint said its analysts assess with a moderate-strong degree of confidence that the attack was not intended to damage national infrastructure and was simply associated with a target which had the finances to support a large payment.

“This would be consistent with DarkSide’s earlier activities, which included several ‘big game hunting’ attacks, whereby attackers target an organization that likely possesses the financial means to pay the ransom demanded by the attackers,” Flashpoint observed.

In response to public attention to the Colonial Pipeline attack, the DarkSide group sought to play down fears about widespread infrastructure attacks going forward.

“We are apolitical, we do not participate in geopolitics, do not need to tie us with a defined government and look for other our motives [sic],” reads an update to the DarkSide Leaks blog. “Our goal is to make money, and not creating problems for society. From today we introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future.”

First surfacing on Russian language hacking forums in August 2020, DarkSide is a ransomware-as-a-service platform that vetted cybercriminals can use to infect companies with ransomware and carry out negotiations and payments with victims. DarkSide says it targets only big companies, and forbids affiliates from dropping ransomware on organizations in several industries, including healthcare, funeral services, education, public sector and non-profits.

Like other ransomware platforms, DarkSide adheres to the current badguy best practice of double extortion, which involves demanding separate sums for both a digital key needed to unlock any files and servers, and a separate ransom in exchange for promise to destroy any data stolen from the victim.

At its launch, DarkSide sought to woo affiliates from competing ransomware programs by advertising a victim data leak site that gets “stable visits and media coverage,” as well as the ability to publish victim data by stages. Under the “Why choose us?” heading of the ransomware program thread, the admin answers:

An advertisement for the DarkSide ransomware group.

“High trust level of our targets. They pay us and know that they’re going to receive decryption tools. They also know that we download data. A lot of data. That’s why the percent of our victims who pay the ransom is so high and it takes so little time to negotiate.”

In late March, DarkSide introduced a “call service” innovation that was integrated into the affiliate’s management panel, which enabled the affiliates to arrange calls pressuring victims into paying ransoms directly from the management panel.

In mid-April the ransomware program announced new capability for affiliates to launch distributed denial-of-service (DDoS) attacks against targets whenever added pressure is needed during ransom negotiations.

DarkSide also has advertised a willingness to sell information about upcoming victims before their stolen information is published on the DarkSide victim shaming blog, so that enterprising investment scammers can short the company’s stock in advance of the news.

“Now our team and partners encrypt many companies that are trading on NASDAQ and other stock exchanges,” DarkSide explains. “If the company refuses to pay, we are ready to provide information before the publication, so that it would be possible to earn in the reduction price of shares. Write to us in ‘Contact Us’ and we will provide you with detailed information.”

DarkSide also started recruiting new affiliates again last month — mainly seeking network penetration testers who can help turn a single compromised computer into a full-on data breach and ransomware incident.

Portions of a DarkSide recruitment message. Image: Intel 471.

“We have grown significantly in terms of the client base and in comparison to other projects (judging by the analysis of publicly available information), so we are ready to grow our team and a number of our affiliates in two fields,” DarkSide explained. The advertisement continued:

“Network penetration testing. We’re looking for one person or a team. We’ll adapt you to the work environment and provide work. High profit cuts, ability to target networks that you can’t handle on your own. New experience and stable income. When you use our product and the ransom is paid, we guarantee fair distribution of the funds. A panel for monitoring results for your target. We only accept networks where you intend to run our payload.”

DarkSide has shown itself to be fairly ruthless with victim companies that have deep pockets, but they can be reasoned with. Cybersecurity intelligence firm Intel 471 observed a negotiation between the DarkSide crew and a $15 billion U.S. victim company that was hit with a $30 million ransom demand in January 2021, and in this incident the victim’s efforts at negotiating a lower payment ultimately reduce the ransom demand by almost two-thirds.

The DarkSide ransomware note.

The first exchange between DarkSide and the victim involved the usual back-and-forth establishing of trust, wherein the victim asks for assurances that stolen data will be deleted after payment.

Image: Intel 471.

When the victim counter-offered to pay just $2.25 million, DarkSide responded with a lengthy, derisive reply, ultimately agreeing to lower the ransom demand to $28.7 million.

“The timer it [sic] ticking and in in next 8 hours your price tag will go up to $60 million,” the crooks replied. “So, you this are your options first take our generous offer and pay to us $28,750 million US or invest some monies in quantum computing to expedite a decryption process.”

Image: Intel 471.

The victim complains that negotiations haven’t moved the price much, but DarkSide countered that the company can easily afford the payout. “I don’t think so,” they wrote. “You aren’t poor and aren’t children if you f*cked up you have to meet the consequences.”

Image: Intel 471.

The victim firm replies a day later saying they’ve gotten authority to pay $4.75 million, and their tormentors agree to lower the demand significantly to $12 million.

Image: Intel 471.

The victim replies that this is still a huge amount, and it tries to secure additional assurances from the ransomware group if it agrees to pay the $12 million, such as an agreement not to target the company ever again, or give anyone access to its stolen data. The victim also tried to get the attackers to hand over a decryption key before paying the full ransom demand.

Image: Intel 471.

The crime gang responded that its own rules prohibit it from giving away a decryption key before full payment is made, but they agree to the rest of the terms.

Image: Intel 471.

The victim firm agrees to pay an $11 million ransom, and their extortionists concur and promise not to attack or help anyone else attack the company’s network going forward.

Image: Intel 471

Flashpoint assesses that at least some of the criminals behind DarkSide hail from another ransomware outfit called “REvil,” a.k.a. “Sodinokibi” (although Flashpoint rates this finding at only “moderate” confidence). REvil is widely considered to be the newer name for GandCrab, a ransomware-as-a-service offering that closed up shop in 2019 after bragging that it had extorted more than $2 billion.

Experts say ransomware attacks will continue to grow in sophistication, frequency and cost unless something is done to disrupt the ability of crooks to get paid for such crimes. According to a report late last year from Coveware, the average ransomware payment in the third quarter of 2020 was $233,817, up 31 percent from the second quarter of last year. Security firm Emsisoft found that almost 2,400 U.S.-based governments, healthcare facilities and schools were victims of ransomware in 2020.

Last month, a group of tech industry heavyweights lent their imprimatur to a task force that delivered an 81-page report to the Biden administration on ways to stymie the ransomware industry. Among many other recommendations, the report urged the White House to make finding, frustrating and apprehending ransomware crooks a priority within the U.S. intelligence community, and to designate the current scourge of digital extortion as a national security threat.

from Krebs on Security https://ift.tt/3o8kOWJ
via IFTTT

El Nokia G10 ya se puede comprar en España: precio y versiones disponibles del último móvil económico de Nokia

El Nokia G10 ya se puede comprar en España: precio y versiones disponibles del último móvil económico de Nokia

A comienzos de abril, Nokia presentó de golpe nada menos que seis nuevos terminales: los Nokia C10 y C20, con Android 11 Go Edition, los Nokia G10 y G20, un escalón por encima, y los Nokia X10 y X20, con 5G como elemento diferenciador. Todos ellos tenían en la autonomía y la experiencia pura de Android sus mejores bazas.

Hasta el momento, sólo había salido a la venta en España el Nokia X20, que puede comprarse en la web de la compañía desde hace unos días. Ahora, el Nokia G10 acaba de aterrizar en nuestro país y ya es posible adquirirlo a un precio oficial de 169 euros.


Continue reading

Youtube Shorts para todos: la plataforma comienza a activar sus vídeos cortos ‘a lo TikTok’ para todos sus usuarios

Youtube Shorts para todos: la plataforma comienza a activar sus vídeos cortos 'a lo TikTok' para todos sus usuarios

Hay pocas dudas de que TikTok es ahora mismo la red social de vídeo que marca el paso al resto de su competencia. Muy lejos quedan ya sus orígenes como Musical.ly, hoy TikTok es toda una superpotencia y su formato de vídeos, de filtros y su uso de la música comercial para sus composiciones marcan tendencia entre sus perseguidores.

Youtube fue uno de los que anunció que se subía al tren de estos vídeos cortos al estilo TikTok. Lo hizo el pasado mes de septiembre de 2020 con el lanzamiento de Youtube Shorts, un nuevo formato de vídeos para su plataforma de hasta 15 segundos de duración y en formato vertical. Sólo restaba que Youtube liberase sus Shorts para todos, y acaba de hacerlo.


Continue reading

Cómo configurar el Modo Descanso del Reloj de Google

Cómo configurar el Modo Descanso del Reloj de Google

Vamos a enseñarte a configurar el Modo Descanso del Reloj de Google, una función algo desconocida, pero muy completa y útil. Ya te hemos hablado del Modo Descanso de Bienestar Digital, pero si no tienes esta app instalada, el reloj de Google es una genial alternativa (bastante completa, además).

En unos sencillos pasos podrás programar mucho más que una alarma: el Modo Descanso silencia el teléfono, es compatible con las rutinas de Google Assistant y nos envía recordatorios antes de ir a dormir.


Continue reading

Truco de Google Fotos: descubre imágenes aleatorias con el botón de ‘Voy a tener suerte’

Truco de Google Fotos: descubre imágenes aleatorias con el botón de 'Voy a tener suerte'

Google Fotos es una galería de fotos con copia de seguridad en la nube tremendamente conocida, pero quizá no sabías que dispone de un botón oculto con el que acceder a fotografías y vídeos aleatorios. El el acceso directo de ‘Voy a tener suerte’, un botón que hasta puedes anclarlo al escritorio de tu Android.

El botón de ‘Voy a tener suerte’ es una de las señas de identidad de Google. Ya en 1998 aparecía el botón en portada de Google; y con un funcionamiento similar al actual: al pulsar sobre el ‘Voy a tener suerte’ (‘I’m feeling lucky‘) el buscador lleva al primer resultado de la búsqueda. Algo parecido a lo que Google Fotos esconde en su propia aplicación Android, aunque aquí varía el resultado: tras apretar en el botón se abren fotos y vídeos aleatorios.


Continue reading