Dharma, Bitpaymer, SamSam and other prominent ransomware strains have generated
hundreds of millions of dollars for their authors, according to calculations by
the FBI. Does that mean the GandCrab gang, which doesn’t even make the FBI’s
list, was lying about pocketing $2 billion before closing shop? Well, not
past three years, ransomware operators have been advancing their tools and
techniques not only to evade detection, but also to wring the most profit out
of an attack. One such innovation is the practice of stealing the victim’s data
and threatening to publish it online if payment is denied. As one would
imagine, it works. In what is essentially a fully fledged data breach,
ransomware that also threatens to publish stolen data is a scary affair. Most
victims end up paying.
every victim and every ransomware strain is difficult, but the most prolific
incidents and ransomware families inevitably crop up over the years. The FBI
recently decided to take a macro look and see the damage done by the most
efficient and profitable ransomware strains. According to Joel DeCapua, a
special agent in the bureau’s global operations and targeting unit, the tally
between January 2013 and July 2019 sits at $144.35 million. If the number
strikes you as suspiciously low, you’re not alone.
the RSA Conference 2020, DeCapua said Ryuk took the lead with $61 million between
February 2018 and October 2019 and Crysis/Dharma came in second at $24 million
between November 2016 and November 2019. Third on the list was Bitpaymer, making
$8 million between October 2017 and September 2019. SamSam, one of the
most-used strains in attacks on healthcare institutions, allegedly made $6.9
million for its authors between 2016 and 2018.
$64 million of
the total ransoms paid to cybercrooks is said to have passed through virtual
currency exchanges before the bad guys cashed out. $37 million remains unspent,
the agent said.
Avid cybersecurity news readers will probably notice something wrong with these figures – especially those keeping a close eye on the GandCrab gang in 2018 and 2019. When the infamous ransomware-as-a-service was retired, its authors claimed to have amassed $2 billion in payments from victims. Even if that number is inflated, it still should have beefed up the FBI’s tally well beyond the half-a-billion mark. So why isn’t the FBI mentioning GandCrab, arguably the most prolific ransomware strain in history?
According to ZDNet, the FBI only counted ransomware families that made demands in Bitcoin, cybercriminals’ favorite digital currency. The GandCrab guys, as some readers may remember, demanded ransom in Dash, a crypto-currency that had just made its debut in cybercrime as GandCrab was wreaking havoc. There are, of course, many other ransomware strains out there cashing in using many different altcoins, so the real bottom line in ransomware profits is arguably much higher.
disclosed to his RSA audience that attackers mostly favor brute-force attacks
on poorly-secured Remote Desktop Protocol (RDP) instances, trying out easy or
common passwords until they get a match. And if RDP doesn’t cut it, phishing
always works like a charm to trick unsuspecting users to hand over login credentials.