Connect with us

Crypto

Trends in ransomware-as-a-service and cryptocurrency to monitor – Help Net Security

Published

on

Trends in ransomware-as-a-service and cryptocurrency to monitor – Help Net Security

In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is widely believed to be affiliated with the Conti ransomware group, joining a list of other groups associated with former Conti operators, including Royal, Black Basta, and Quantum.

RaaS affiliates are all over the globe, and so are their victims. These affiliates use a myriad of different tactics and techniques. In this article, I’ll cover what the Hive case tells us about RaaS trends, how it relates to cryptocurrency, and how to defend against similar groups.

Hive’s modus operandi

Hive, like other RaaS providers, wrote a ransomware encryptor, created a dark web domain, advertised their services to affiliates and forums, and then allowed users to purchase a license (for their services) to configure a ransomware payload and receive extortion funds.

RaaS providers typically take a cut of the ill-gotten proceeds – it’s usually a 75/25, 80/20, or 85/15 split (Hive was 80/20).

Advertisement

Hive, and every other ransomware group, still uses cryptocurrency for ransomware payments because it is borderless and almost instant. There are no conversions or bank approvals; it’s an anonymous system of transferring and instantly sending funds around the globe. Cryptocurrency also makes it easy to split the money extorted from victims with other users.

Priced high or low, cryptocurrency is the best and most effective avenue for ransomware operators to elicit funds from victims. The price of cryptocurrency follows the path of Bitcoin (BTC). If BTC goes up, most others go up as well. Conversely, if its price goes down, everything else follows.

To account for its often-volatile value, when attackers breach a victim and demand a ransom, they simply alter the amount of cryptocurrency they ask for based on the current price of the token used. In other words, operators base the ransom on the conversion price, not the token price. For example, if a ransomware group wants to ransom a business for $50,000, they will convert that into the current token price and ask for that much.

While most cryptocurrency is traceable, many ransomware operators perform their misdeeds from countries with governments who tend to look the other way, especially if the attacks don’t target the country they are operating from. For example, many ransomware operators from Eastern Europe and Russia put logic in their malware’s code to geolocate a victim’s machine. The malware will terminate if it is in a country that is part of the Commonwealth of Independent States (CIS), allowing ransomware operators in these countries to deploy ransomware without worrying as much about being arrested (Hive is an example of this). But to try and protect themselves from being traced, attackers still use mixers and privacy coins to mask their tracks.

The Hive case is unique in that a global, joint operation of federal authorities from several countries worked together to take down the infrastructure of a ransomware group. This was primarily possible because the Hive group’s infrastructure (servers) was in the United States, at least partially.

Advertisement

The operation – and other recent takedowns of ransomware groups like REvil and DarkSide, not to mention various affiliates that use other ransomware – demonstrates how governments are becoming more offensive in stopping these threat actors. Law enforcement and cybersecurity agencies have realized that a purely defensive strategy isn’t the best approach to tackling this issue.

The Hive group’s affiliates attacked organizations all over the globe. A map of the affected countries provided by the United States Department of Justice (USDOJ) showed that, unsurprisingly, very few CIS countries were affected. In contrast, the group had victims in almost every other part of the globe.

Additionally, these attacks used various methodologies to breach organizations. That’s because different affiliates have different tactics, even within the same ransomware group. Every RaaS group will have multiple tactics and techniques they can implement in various ways. That complicates the challenge of defending against them.

Set up defense-in-depth

For security professionals, it means a good defensive posture should be holistic and include defense-in-depth mechanisms.

For example, Hive affiliates have been known to breach organizations using Remote Desktop Protocol (RDP) without multi-factor authentication (MFA), stolen credentials, phishing campaigns, and software vulnerabilities. There isn’t a single solution to effectively tackle these issues; you’d need multiple solutions working synergistically together to thwart attacks.

Advertisement

You would need to implement a policy to ensure MFA is on any authentication to your network (a zero-trust network, ideally), multi-factor license(s) if you don’t have them, email security and phishing training solutions, and a patch management system with comprehensive asset management behind it. That is to solve the known techniques from one RaaS group.

Let’s take another group, for example: Cl0p. They are known for breaching software companies and then breaching other companies that use their software – a supply chain attack with ransomware and/or data exfiltration. To protect yourself from this kind of attack, your defensive posture should be comprehensive and have a series of checks and balances. If one solution fails, ideally, you’d want another to catch the misses or false positives. Of course, I’m talking about an ideal solution.

Since most companies can’t just throw a bunch of money at solutions, I’d recommend tackling phishing and email security (with training) unless there is a glaring problem in your security elsewhere. Almost all threat actors disseminate malware via phishing emails and targeting – in fact this is where most breaches start according to the 2023 Verizon Data Breach Investigations Report.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Crypto

Hong Kong firm HKVAX gets approval to run city’s third cryptocurrency exchange

Published

on

Hong Kong firm HKVAX gets approval to run city’s third cryptocurrency exchange
Hong Kong’s securities regulator has approved the city’s third cryptocurrency exchange, the first to be licensed under a two-year-old virtual-asset regulatory regime that has so far struggled to gain traction.
Hong Kong Virtual Asset Exchange on Thursday obtained a licence for its trading platform HKVAX, according to an updated list on the Securities and Futures Commission (SFC) website.

With its expertise in security token offerings (STO) and real-world asset (RWA) tokenisation, HKVAX aims to offer over-the-counter trading, exchange and custody services, the company said in a statement published on Friday.

The licence “demonstrates Hong Kong’s resolve to lead in the virtual-asset industry”, while HKVAX aims to establish the city as “the STO and RWA centre for Asia and beyond”, co-founder and chief executive Anthony Ng said in the statement.

01:53

Hong Kong’s financial summit ends on an upbeat note as city heads ‘back to business’

Advertisement

Hong Kong’s financial summit ends on an upbeat note as city heads ‘back to business’

The company’s trading platform and onboarding system are still “undergoing final preparations”, the company said in a notice on its website.

Continue Reading

Crypto

From $37B to $24.5B: DAO Treasuries Experience Significant Downturn – Blockchain Bitcoin News

Published

on

From B to .5B: DAO Treasuries Experience Significant Downturn – Blockchain Bitcoin News
In October 2024, the latest data shows that decentralized autonomous organizations (DAOs) hold $24.5 billion in treasuries, down by $12.6 billion since the end of March. Optimism’s DAO, which boasted $8.3 billion on Mar. 24, has seen its treasury shrink to $3.8 billion, making it the largest DAO treasury despite the decline. Decentralized Autonomous Organizations […]
Continue Reading

Crypto

Deadline Extended! Argentinians Seize Last Chance for Cryptocurrency Amnesty!

Published

on

Deadline Extended! Argentinians Seize Last Chance for Cryptocurrency Amnesty!
  • Local exchanges like Bitso and Lemon report significant increases in digital currency deposits since the amnesty’s announcement.
  • Carlos Peralta of Bitso noted a surge in inquiries, suggesting higher future participation before the deadline extension.

In Argentina, the cryptocurrency amnesty program, initiated in July, has surprisingly exceeded expectations according to local exchanges. This initiative allows Argentinians to declare their cryptocurrency holdings to the government without fear of repercussions.

The deadline for this declaration has been extended to October 31

The Argentine government has extended the deadline for asset regularization through Decree No. 864/2024, published on September 30, 2024. This extension modifies the dates of the regime established by Law No. 27.743 on Palliative and Relevant Fiscal Measures, allowing fiscal residents in Argentina and non-residents who were previously fiscal residents to voluntarily declare assets both domestically and abroad until October 31, 2024, for the first stage. The subsequent stages have been extended to January 31, 2025, and April 30, 2025, respectively.

Furthermore, the decree specifies that funds regularized up to September 30, 2024, can be withdrawn starting October 1, 2024, without retention, provided that no new regularizations are made after that date. Funds not exceeding USD 100,000 will be exempt from retention starting November 1, 2024, and those exceeding that amount must be kept in special accounts or allocated to authorized investments until December 31, 2025, to avoid a 5% retention.

Fiscal transparency and the integration of undeclared assets into the formal economy

Representatives from cryptocurrency exchanges such as Bitso and Lemon have reported a significant uptake in participation since the program’s announcement. They observed a record increase in digital currency deposits, suggesting a strong willingness among Argentinians to comply with the new regulations.

Carlos Peralta, the leader of Public Affairs at Bitso Argentina, noted a spike in inquiries even before the extension was announced, indicating a high level of interest. 

“Perhaps now with more time, they decide to enter” Peralta commented, hinting at the potential for even greater participation in the coming weeks.

Advertisement

Similarly, Juan Pablo Fridenberg, Director of Public Affairs at Lemon, highlighted that September saw the highest volume of cryptocurrency deposits in the platform’s history. 

“Although we do not know how many users have effectively joined, as this information is only available to the Federal Administration of Public Revenue (AFIP), we can affirm that the volume exceeded July’s by 23%,” said Fridenberg.

As we usually report on Crypto News Flash, this initiative by the Argentine government aims to bring transparency to the cryptocurrency market, which has traditionally operated with minimal oversight. By encouraging citizens to declare their digital assets, the government hopes to integrate these into the formal crypto economic system, reducing the risks associated with unregulated markets.

The positive response from the public and the extension of the deadline reflect the growth, as we have been reporting on Crypto News Flash, this may accept and normalize cryptocurrencies in Argentina. This move is part of a broader effort to stabilize the financial system and restore trust among investors and the public in the potential of digital currencies as legitimate financial assets.

Advertisement
Continue Reading

Trending