The tables have been turned, the FBI & DOJ claimed following asserting the use of blockchain technology to keep track of down the contents of DarkSide’s cryptocurrency wallet.
United States regulation enforcement has clawed back around $2.3 million of the ransom allegedly paid to DarkSide by Colonial Pipeline past month, the Department of Justice (DOJ) and FBI declared in a joint press meeting on Monday.
“Today we turned the tables on DarkSide,” FBI Deputy Director Paul Abbate claimed in live-streamed remarks.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
They seized the dollars – in the variety of 63.7 bitcoins – by reviewing the Bitcoin community ledger, as the DOJ explained in a press release. Law enforcement tracked several transfers of bitcoin and had been ready to detect that about 63.7 of the bitcoins compensated by Colonial Pipeline Co. soon after the May possibly 7 ransomware attack have been transferred to a unique address – an handle that the FBI controls.
Download “The Evolution of Ransomware” to get valuable insights on emerging developments amidst fast escalating attack volumes. Simply click earlier mentioned to hone your protection intelligence!
“Law enforcement was ready to monitor several transfers of bitcoin and detect that somewhere around 63.7 bitcoins, symbolizing the proceeds of the victim’s ransom payment, had been transferred to a particular tackle, for which the FBI has the ‘private vital,’ or the tough equal of a password needed to accessibility assets accessible from the specific Bitcoin tackle,” in accordance to the DOJ’s press release. “This bitcoin signifies proceeds traceable to a computer intrusion and property involved in cash laundering and may be seized pursuant to criminal and civil forfeiture statutes.”
In point, the FBI laid the snare from the get-go, when Colonial alerted the bureau to the attack, the DOJ said for the duration of Monday’s press convention. In that attack, the DarkSide ransomware-as-a-assistance (RaaS) gang seized Colonial’s units, forcing Colonial – a important service provider of liquid fuels to the East Coast – to temporarily halt all pipeline functions.
The shutdown despatched gasoline costs skyrocketing and prompted gas stockpiling, as illustrations or photos of people today piling plastic bags total of fuel or stacking gasoline containers in their automobile trunks designed the rounds on social media. The ransomware attack also activated the Biden administration to issue an crisis declaration that coated 17 states and Washington D.C.
Potentially the tables have been turned, but only about 50 percent-way: Colonial reportedly shelled out $5 million in ransom to DarkSide. Do the math, and it usually means that the DarkSide risk actors even now walked away with about fifty percent of the cryptocurrency. Provided that the team is thought to be positioned in Russia, they are also unlikely to experience prison action on the element of the US governing administration.
Hit ‘Em Where by It Hurts
But, as Abbate pointed out and all those in attendance at the press meeting emphasized, regulation enforcement did deal with to deprive DarkSide of what the group is soon after: Namely, revenue. DarkSide reported the exact same point early on in this, the attack that sent out however-spreading ripples: they had been right after gain, not to disrupt critical infrastructure. The gang asserted in a assertion that they are “apolitical” and never want to be tied to any authorities activity or disruptions.
Or, to set it a lot more succinctly, as quite a few observers noticed it, DarkSide did not know what it was receiving itself into, earning the Colonial attack a “very significant oops”, as just one security qualified set it. DarkSide was paralyzed itself a 7 days following the attack: Its operators introduced that they had dropped accessibility to the general public section of the group’s infrastructure. Exclusively, the servers for its web site, payment processing and denial-of-support (DoS) operations had been seized. DarkSide did not specify the region in which those people servers operated or whose legislation enforcement seized them.
Turning Off the Bitcoin Tap
“Following the income stays a person of the most simple, yet powerful tools we have,” Deputy Attorney Common Lisa O. Monaco was quoted as saying in the press launch. “Ransom payments are the fuel that propels the digital extortion engine, and today’s announcement demonstrates that the United States will use all readily available resources to make these attacks far more pricey and fewer profitable for criminal enterprises. We will carry on to goal the whole ransomware ecosystem to disrupt and prevent these attacks.”
The activity power that handled the Bitcoin seizure provided the Particular Prosecutions Segment and Asset Forfeiture Device of the U.S. Attorney’s Business office for the Northern District of California, with guidance from the DOJ Legal Division’s Money Laundering and Asset Recovery Segment and Computer Crime and Mental Residence Part, and the Nationwide Security Division’s Counterintelligence and Export Management Section. It was coordinated as a result of the DOJ’s Ransomware and Electronic Extortion Process Pressure, which was produced to beat the escalating range of ransomware and digital extortion attacks. In fact, the DarkSide seizure was the task force’s to start with action.
Monday’s announcement demonstrates how important it is to notify legislation enforcement early on if an firm is focused with ransomware, Monaco reported, thanking Colonial for carrying out just that: Promptly notifying the FBI when the business realized that it had been qualified by DarkSide.
Down load our distinctive Cost-free Threatpost Insider E book, “2021: The Evolution of Ransomware,” to enable hone your cyber-protection strategies in opposition to this developing scourge. We go beyond the position quo to uncover what is up coming for ransomware and the associated rising dangers. Get the total story and Obtain the E book now – on us!
Some pieces of this article are sourced from:
threatpost.com