In a wide-ranging interview, a REvil chief reported the gang is earning $100 million for every year, and supplied insights into the lifetime of a cybercriminal.
The REvil ransomware gang statements it will rake in $100 million by year’s conclusion. Which is in accordance to a REvil team leader in a scarce Q&A with the YouTube Channel for tech blog site “Russian OSINT.” Through the live job interview, the REvil hacker warned of a “big attack coming…linked to a incredibly substantial video video game developer.”
The boasting and threats arrive on the heels of REvil’s main rivals, the Maze gang, announcing that it was closing up shop (see below).
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The job interview (Russian translation offered to Threatpost by Flashpoint) was huge-ranging and touches on the group’s functions, the cash it tends to make, facts on its superior-profile attacks and the point that the customers are actively being hunted by governments about the planet.
Operations
The Q&A very first presented aspects into the group’s functions. For instance, the interviewee signaled an upcoming modify in technique.
Although REvil currently takes advantage of the double-extortion strategy (in which companies’ files are not just encrypted but also stolen, with a threatened leak incorporating tension to pay out the ransom), the chief suggested that the long term lie in using that method more.
“Everything in the end comes down to a shift toward leaking information and not locking them,” he claimed. “I individually definitely liked SunCrypt’s concept. DoS [denial of service] the website of the corporation and their infrastructure, put together with locking the information and threatening to publish them…[it] places a large amount of force on them…[We’re] considering about using a similar product.”
He also confirmed that REvil employs the ransomware-as-a-services product, the place “affiliates” that have out the attacks acquire 70 to 80 p.c of the “revenue” from the ransoms. The affiliate marketers themselves are strictly vetted (much like the NetWalker gang), and are accountable for initial network an infection, wiping out any backups and downloading documents. REvil users in the meantime just take care of ransom negotiations, program improvement and updates, receipt of the payment and the delivery of the decryptor.
When it will come to associates, “we have our very own closed family members, the variety is very arduous and we don’t even hassle speaking to [amateurs],” he mentioned. “Support only aids when it comes to negotiations. They have to grasp all the specialized pieces of the position by them selves.”
That claimed, the team also carries out its very own attacks, he claimed, with a device devoted to hacking businesses – however the ransomware-as-a-support (RaaS) product is a lot more beneficial.
He also mentioned that Android or iOS ransomware is not in the playing cards for the group, simply because of the low value of the info saved on telephones. “You have to be crazy to get concerned in this,” he claimed. “I’m 100 % against it.”
Large-Profile Attacks
All of that business enterprise layout has authorized REvil to claim some really large headlines. For occasion, when requested what the most significant coups were being for REvil, he cited, with delight, Travelex, Grubman Shire Meiselas & Sacks, and the 23 Texas municipalities that the gang attacked final summer months.
The interviewee also took credit rating for two rumors involved with REvil. A person, that it captured information on President Donald Trump and that REvil was powering Chile’s Banco Estado shutting all of its branches.
In the circumstance of Trump, the data files have been reportedly lifted as aspect of the Grubman hack. “We just wished “good luck” to the NSA, FBI, and the U.S. Top secret Support with the decryption of the files,” he stated. “We didn’t need cash from Trump [directly]…The money for the [stolen] facts was paid out. I simply cannot notify you who bought it, while. The information experienced to do with tax-avoidance scheme affiliated with Trump.”
As for Banco Estado, the first vector was email to bank employees, he mentioned: “Yes, it seriously took place – we did it,” he alleged. “Often, businesses do not disclose the supply of the attack since they are worried of reputational damage [affecting] their inventory posture.”
He added that all-around a person-3rd of all companies quietly negotiate to shell out the ransom, and that IT companies, insurance policies companies, law places of work, producing and the agro-industrial sector are the most-worthwhile targets.
As for initial access, the interviewee mentioned that harvesting and employing administrative qualifications with malware, brute-forcing Distant Desktop Protocol connections and exploiting bugs are the best avenues for attack.
“Grubman and Travelex…both ended up hacked by way of previous variations of Pulsar and Citrix,” he said. “It is truly rather silly — we received access to the [network] in minutes, and all thanks to a person vulnerability that can be patched immediately.”
Attacks are possible to ramp up – and indeed the aforementioned movie-recreation firm attack is in the operates but below wraps, the REvil operator claimed. But geopolitical realities will insert to the momentum, in accordance to Ilia Kolochenko, founder and CEO of web security company ImmuniWeb.
“The pandemic slowly exacerbates the problem, as budgets are staying lowered, cybersecurity men and women are all fatigued, although workers performing from residence are noticeably far more vulnerable and inclined to a large spectrum of phishing attacks,” he claimed, by using email. “Frequently, it is enough to breach 1 single person device to get into a company network by means of VPN. Consequently, cybercriminals are now having fun with a windfall of surging revenue by very easily picking up very low-hanging fruits in impunity. Worse, some cybersecurity industry experts might faster or later on ponder all execs and cons, and offered the unprecedented possibilities and minimal dangers, will quickly shift from their each day positions to generous cyber-gangs.”
Dollars, Income, Revenue
All of this activity is in support of system to one matter: Personal enrichment.
The REvil leader famous that daily life as a cybercriminal begun for him with online video online games.
“Once upon a time, when I was a kid, I put in CHLENIX [cheat config for Counter Strike] and genuinely liked it,” he described. That legacy lives on. The ransomware’s title is shorter for “Ransom Evil,” with the nomenclature encouraged by the video clip game “Resident Evil,” according to the interview (only security researchers call it Sodinokibi, he mentioned).
CHLENIX direct to more nefarious points, and now he’s leading a team that promises to be raking in $100 million for every calendar year. Which is less than what REvil’s precursor, GandCrab, was generating. That group announced a shutdown in June 2019, following declaring to make $2 billion in a 12 months and a fifty percent.
REvil was soon produced to take its put, and though the interviewee didn’t affirm the GandCrab connection exclusively, he admitted that an previously venture was shut down to make way for a “better merchandise.”
When questioned when it would be time to move away sort “the existence,” he answered. “Personally, I really should have stopped a very long time back. I have sufficient funds for hundreds of many years, but there is in no way also much money…[I hope to have] $1 billion, then $2 billion, and then if I’m in a very good temper, $5 billion.”
“The [$100 million] range is just a idea of the cybercrime income iceberg,” mentioned Kolochenko. “Concomitant proliferation of cryptocurrencies can make these types of crimes technically uninvestigable, whilst law enforcement businesses and joint endeavor forces are currently overburdened with country-point out attacks, and transnational targeted attacks aimed to steal intellectual house from the biggest Western providers.”
The Draw back: Being Hunted
Traditional knowledge claims that cyberattackers thrive in dark shadows and anonymity – but feedback by the gang chief propose that REvil members might not be as faceless as they would like.
When asked if team customers could vacation for instance, the reply was an uncategorical “nope.” The Russian-talking interviewee included that, contrary to Kolochenko’s declare that getting a ransomware operator is “low risk,” no one included in ransomware would ever journey to Western countries or the United States for dread of staying killed.
“We produce critical complications and there is no justice for us, so killing us would be the only viable option,” he claimed.
He said the group believes they are getting hunted by the U.S. Mystery Service, Europol and infosec corporations on a daily basis, with CIA brokers actively striving to infiltrate the group’s functions by posing as an affiliate applicant.
“But usually, their go over falls aside,” he famous. And as for hack-backs, “they have no strategy what type of OS we use on our servers or what form of web servers we use… They are just hoping to get fortunate. Our product…is configured to defend from them.”
Maze Closes Down
All through the job interview, the REvil chief also touched on its arch rival criminal team Maze, which is reportedly shuttering its functions.
In accordance to another person identifying themselves as a Maze operator informed Bleeping Pc this 7 days that the group halted its encryption activities back in September, in buy to concentration on finding present victims to pay back up.
Before long right after, Maze affiliate marketers began porting above to the Egregor ransomware gang, the outlet reported.
Maze was a pioneer in the double-extortion tactic, very first emerging final November. Considering the fact that then, it has produced waves with big strikes this sort of as the a person from Cognizant. And this summer time it shaped a cybercrime “cartel” – signing up for forces with various ransomware strains (which includes Egregor) sharing code, thoughts and resources.
“Criminals never just have an epiphany and quit remaining criminals overnight,” reported Lamar Bailey, senior director of security research at Tripwire, by using email. “They shut down an operation when the return on their expenditure drops below the charges of operating the ‘program’ or when they are about to get caught. This is no distinct.”
He extra, “They are switching to something new, it’s possible Egregor, which miraculously arrived out at the identical time Maze started off shutting down. This is just like that a person furniture retail store in city that is likely out of small business each individual couple months only to reopen with a new title but with the identical people today and merchandise.”
Hackers Set Bullseye on Health care: On Nov. 18 at 2 p.m. EDT find out why hospitals are finding hammered by ransomware attacks in 2020. Save your spot for this No cost webinar on health care cybersecurity priorities and listen to from primary security voices on how knowledge security, ransomware and patching want to be a precedence for every single sector, and why. Be a part of us Wed., Nov. 18, 2-3 p.m. EDT for this LIVE, constrained-engagement webinar.
Some pieces of this short article are sourced from:
threatpost.com