Page 35 - Banking Finance October 2023
P. 35

ARTICLE

         CA. It is estimated that Hive left behind over 1,500 victims
         worldwide and extorted millions of dollars in ransom
         payments.


         DarkSide: DarkSide is a RaaS operation associated with an
         eCrime group tracked by CrowdStrike as CARBON SPIDER.
         DarkSide operators traditionally  focused  on Windows
         machines and have recently expanded to Linux, targeting
         enterprise environments running unpatched VMware ESXi
         hypervisors or stealing vCenter credentials. On May 10, the
         FBI publicly indicated that the Colonial Pipeline incident
         involved the DarkSide ransomware. It was later reported
         that Colonial Pipeline had approximately 100GB of data
         stolen from their network, and the organization allegedly
         paid almost $5 million USD to a DarkSide affiliate.

                                                              LockBit: In development since at least September 2019,
         REvil: REvil, also known as Sodinokibi, was identified as the
                                                              LockBit is available as a RaaS and is advertised to Russian-
         ransomware behind one of the largest ransom demands on
                                                              speaking users or English speakers with a Russian-speaking
         record: $10 million. It is sold by the criminal group PINCHY
                                                              guarantor. In  May 2020, an affiliate operating  LockBit
         SPIDER, which sells RaaS under the affiliate model and
         typically takes 40% of the profits.                  posted a threat to leak data on a popular Russian-language
                                                              criminal forum.
         Like TWISTED SPIDER's initial leaks, PINCHY SPIDER warns
         victims of the planned data leak, usually via a blog post on  Combating RaaS:
         their DLS containing sample data as proof, before releasing  Addressing the issue of Ransomware as a Service (RaaS)
         the bulk of the data after a given amount of time. REvil will  requires  a  multi-faceted  approach  involving  various
         also provide a link to the blog post within the ransom note.  stakeholders. Here are some key solutions that may help
         The link displays the leak to the affected victim prior to being  mitigate the impact of RaaS:
         exposed to the public. Upon visiting the link, a countdown  1. Enhanced  Cybersecurity Measures: Organizations
         timer will begin, which will cause the leak to be published  should implement robust cybersecurity measures to
         once the given amount of time has elapsed.              protect their networks, systems, and data. This includes
                                                                 using up-to-date security software, regularly patching
         Dharma: Dharma ransomware attacks have been attributed  vulnerabilities, enforcing strong access controls, and
         to a financially motivated Iranian threat group. This RaaS  conducting regular security audits and risk assessments.
         has been available on the dark web since 2016 and is mainly
         associated with remote desktop protocol (RDP) attacks.  2. Employee Training and Awareness: Education and
         Attackers usually demand 1-5 bitcoins from targets across  training programs are vital to raise awareness among
         a  wide  range  of  industries.  Dharma is  not  centrally  employees about the risks of ransomware and how to
         controlled, unlike REvil and other RaaS kits.           recognize and  respond to  potential threats.  This
                                                                 includes educating them on best practices for email and
         Dharma variants come from many sources,  and most       web  browsing,  avoiding  suspicious  links  and
         incidents in which CrowdStrike identified Dharma revealed  attachments, and reporting any suspicious activity
         nearly a 100% match between sample files. The  only     promptly.
         differences were the encryption keys, contact email, and a
         few other things that can be customized through a RaaS  3. Regular Data Backups: Maintaining regular backups of
         portal. Because Dharma attacks are nearly identical, threat  critical data is essential to minimize the impact of a
         hunters are not able to learn much about who is behind a  ransomware attack. Organizations should follow the 3-
         Dharma attack and how they operate from a single incident.  2-1 backup rule, which involves keeping at least three


            BANKING FINANCE |                                                             OCTOBER | 2023 | 35
   30   31   32   33   34   35   36   37   38   39   40