Ransomware Roundup: 03.25.22

Industry
Written by
Halcyon Team
Published on
Mar 25, 2022

The researchers over at Splunk ran a nifty little test showcasing the encryption speed of 10 popular ransomware variants. This “murderer’s row” lineup consisted of LockBit, Babuk, Avaddon, Ryuk, REvil, BlackMatter, Darkside, Conti, Maze and Mespinoza with LockBit clocking in at a blazing 5 minutes and 50 seconds to completely encrypt the 54GB sample file. The slowest of the group, Mespinoza, came in at almost two hours – clearly their dev team has a lot of optimization tickets in the backlog. Somewhat surprisingly the notorious Conti ransomware took almost an hour – 59 minutes and 34 seconds – to do its damage. We’re now entering the era with RaaS groups are advertising features like encryption time to their prospective affiliates just like a SaaS company might.

The biggest news this week was obviously the breach announcement by Okta, Microsoft and some other name brand tech companies that their infrastructure had been impacted by the Lapsus$ ransomware gang. In a meteoritic rise (and subsequent fall) the gang first started to gain traction early in the year with some throwback website defacements before moving on to larger data targets and focusing purely on data exfiltration – in some cases entirely skipping the ransom part and just leaking data, possibly just for the lulz. While disorganized and seemingly dysfunctional, they managed to attack multiple large organizations with a variety of methods including straight up bribery for access (we’ve heard up to $20K USD a week was offered).

The party, however, is most likely over for the Lapsus$ gang as the City of London Police state they’ve arrested seven members of the gang including the supposed leader – who happens to be a 16 year old kid from Oxford. There goes all that cyber vendor messaging about how today's attackers aren't just some kid in their mom's basement. Like what we’ve seen recently with Conti, ultimately the downfall came from disagreements within the group leading to information being publicly leaked. What remains to be seen is whether some of the tactics used (use of telegram, direct exfiltration, targeted bribery, etc.) will be used by other, more OpSec-minded groups in the future.

After a warning from the White House that businesses should be prepared for fallout from the Russian invasion of Ukraine, CISA/DHS issued a memo and spoke with critical infrastructure providers in the Energy sector. The FBI also released is 2021 Internet Crime Report (PDF) which heavily focuses on RaaS groups citing REvil, LockBit 2.0, and Conti as the biggest groups behind much of the attacks on US organizations last year.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3

halcyon.ai is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:

You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.

By clicking submit below, you consent to allow halcyon.ai to store and process the personal information submitted above to provide you the content requested.

Back
Next