Normal view
-
TechCrunch - Dark Web
- NetWalker ransomware operator extradited to the US, over $28M in bitcoin seized
-
TechCrunch - Dark Web
- This crowdsourced payments tracker wants to solve the ransomware visibility problem
This crowdsourced payments tracker wants to solve the ransomware visibility problem
Fujifilm becomes the latest victim of a network-crippling ransomware attack
Maze, a notorious ransomware group, says itβs shutting down
One of the most active and notorious data-stealing ransomware groups, Maze, says it is βofficially closed.β
The announcement came as a waffling statement, riddled with spelling mistakes and published on its website on the dark web, which for the past year has published vast troves of stolen internal documents and files from the companies it targeted, including Cognizant, cybersecurity insurance firm Chubb, pharmaceutical giant ExecuPharm, Tesla and SpaceX parts supplier Visser and defense contractor Kimchuk.
Where typical ransomware groups would infect a victim with file-encrypting malware and hold the files for a ransom, Maze gained notoriety for first exfiltrating a victimβs data and threatening to publish the stolen files unless the ransom was paid.
It quickly became the preferred tactic of ransomware groups, which set up websites β often on the dark web β to leak the files it stole if the victim refused to pay up.
Maze initially used exploit kits and spam campaigns to infect its victims, but later began using known security vulnerabilities to specifically target big-name companies. Maze was known to use vulnerable virtual private network (VPN) and remote desktop (RDP) servers to launch targeted attacks against its victimβs network.
Some of the demanded ransoms reached into the millions of dollars. Maze reportedly demanded $6 million from one Georgia-based wire and cable manufacturer, and $15 million from one unnamed organization after the group encrypted its network. But after COVID-19 was declared a pandemic in March, Maze β as well as other ransomware groups β promised to not target hospitals and medical facilities.
But security experts arenβt celebrating just yet. After all, ransomware gangs are still criminal enterprises, many of which are driven by profit.
A statement by the Maze ransomware group, claiming it has shut down. Screenshot: TechCrunch
βObviously, Mazeβs claims should be taken with a very, very small pinch of salt,β said Brett Callow, a ransomware expert and threat analyst at security firm Emsisoft. βItβs certainly possible that the group feels they have made enough money to be able to close shop and sail off into the sunset. However, itβs also possible β and probably more likely β that theyβve decided to rebrand.β
Callow said the groupβs apparent disbanding leaves open questions about the Maze groupβs connections and involvement with other groups. βAs Maze was an affiliate operation, their partners in crime are unlikely to retire and will instead simply align themselves with another group,β he said.
Maze denied that it was a βcartelβ of ransomware groups in its statement, but experts disagree. Steve Ragan, a security researcher at Akamai, said Maze was known to post on its website data from other ransomware, like Ragnar Locker and the LockBit ransomware-for-hire.
βFor them to pretend now that there was no team-up or cartel is just plain backwards. Clearly these groups were working together on many levels,β said Ragan.
βThe downside to this, and the other significant element, is that nothing will change, Ransomware is still going to be out there,β said Ragan. βCriminals are still targeting open access, exposed RDP [remote desktop protocol] and VPN portals, and still sending malicious emails with malicious attachments in the hope of infecting unsuspecting victims on the internet,β he said.
Jeremy Kennelly at FireEyeβs Mandiant threat intelligence unit said that while the Maze brand may be dead, its operators are likely not gone for good.
βWe assess with high confidence that many of the individuals and groups that collaborated to enable the Maze ransomware service will likely continue to engage in similar operations β either working to support existing ransomware services or supporting novel operations in the future,β said Kennelly.
Maze, a notorious ransomware group, says itβs shutting down by Zack Whittaker originally published on TechCrunch
Cyber threat startup Cygilant hit by ransomware
Cygilant, a threat detection cybersecurity company, has confirmed a ransomware attack.
Christina Lattuca, Cygilantβs chief financial officer,Β said in a statement that the companyΒ was βaware of a ransomware attack impacting a portion of Cygilantβs technology environment.β
βOur Cyber Defense and Response Center team took immediate and decisive action to stop the progression of the attack. We are working closely with third-party forensic investigators and law enforcement to understand the full nature and impact of the attack. Cygilant is committed to the ongoing security of our network and to continuously strengthening all aspects of our security program,β the statement said.
Cygilant is believed to be the latest victim of NetWalker, a ransomware-as-a-service group, which lets threat groups rent access to its infrastructure to launch their own attacks,Β according to Brett Callow, a ransomware expert and threat analyst at security firm Emsisoft.
The file-encrypting malware itself not only scrambles a victimβs files but also exfiltrates the data to the hackerβs servers. The hackers typically threaten to publish the victimβs files if the ransom isnβt paid.
A site on the dark web associated with the NetWalker ransomware group posted screenshots of internal network files and directories believed to be associated with Cygilant.
Cygilant did not say if it paid the ransom. But at the time of writing, the dark web listing with Cygilantβs data had disappeared.
βGroups permanently delist companies when theyβve paid or, in some cases, temporarily delist them once theyβve agreed to come to the negotiating table,β said Callow. βNetWalker has temporarily delisted pending negotiations in at least one other case.β
Cyber threat startup Cygilant hit by ransomware by Zack Whittaker originally published on TechCrunch