Cybercrime
,
Fraud Management & Cybercrime
,
Ransomware
5 Suspects Arrested; Group Tied to Ransomware Attacks Against 1,800 Victims
Police have arrested a group of criminals in Ukraine who they suspect launched ransomware attacks against large organizations based in more than 70 different countries.
See Also: Live Webinar | Generative AI: Myths, Realities and Practical Use Cases
Since 2018, the group has been tied to attacks that “affected over 1,800 victims in 71 countries,” and demanded ransom payoffs that collectively totaled at least several hundreds of millions of dollars, Eurojust, the EU agency for criminal justice cooperation which helped coordinate the ongoing operation, said in a statement.
Ukrainian police accused the crime group of attacking some of world’s biggest companies, including Norwegian aluminum giant Norsk Hydro in 2019.
“As a result of many months of painstaking work, Ukrainian law enforcement officers – with the assistance of colleagues from the U.S., Norway, the Netherlands, Germany and France – identified the 32-year-old leader of the hacker group and his four most active accomplices,” Yuriy Vykhodets, who heads Ukraine’s Cyber Police Department, said in a statement, according to a machine translation.
Ukrainian police arrested all five suspects on Nov. 21, backed by 20 investigators from international law enforcement agency partners who deployed to Ukraine for the raids. Police also searched 30 properties in the regions of Kyiv, Cherkasy, Rivne and Vinnytsia, seized more than 100 digital devices, $110,000 in cash and an unspecified amount of cryptocurrency. Police didn’t name the suspects.
The EU’s law enforcement agency, Europol, which helped coordinate the investigation, said in a Tuesday statement that the suspects have been accused of using such strains of crypto-locking malware as Dharma, Hive, LockerGoga and MegaCortex, among others, to attack victims.
Europol said the group often targeted large companies, seeking bigger ransom payoffs – known as big-game hunting – and operated from the Ukrainian capital of Kyiv both before and after Russia launched its all-out war of conquest in February 2022.
As of September 2022, authorities reported that the group appeared to be defunct.
The suspects’ arrests come as part of an ongoing operation launched by France in 2019, working with Norway, France, the U.K. and Ukraine. Their probe has run in in parallel to Dutch, German, Swiss and U.S. authorities – including the FBI and U.S. Secret Service – each running their own, independent investigations into the group.
Europol said the latest searches and arrests built in part on digital forensic evidence gathered after a first round of arrests in the ongoing operation in October 2021, when police detained 12 “high-value targets” in both Ukraine and Switzerland.
Authorities believe different members of the group served different roles, with some appearing to specialize in penetrating victims’ networks, while others handled money laundering for cryptocurrency ransoms victims paid in exchange for the promise of a decryptor.
The group used a variety of tactics to penetrate victims’ networks, including SQL injection attacks, brute-force password cracking and running phishing campaigns designed to steal valid usernames and passwords, police said.
“Once inside the networks, the attackers remained undetected and gained additional access using tools including TrickBot malware, Cobalt Strike and PowerShell Empire, in order to compromise as many systems as possible before triggering ransomware attacks,” Europol said (see: Block This Now: Cobalt Strike and Other Red-Team Tools).
Swiss authorities, working with Romanian cybersecurity firm Bitdefender, last year shared free decryptors to the public/private No More Ransom portal, built using digital forensic evidence gathered during the operation. Police said the decryptors can decrypt variants of the LockerGoga and MegaCortex ransomware used by the Ukrainian group to encrypt some victims’ systems (see: LockerGoga Victims Get Free Decryptor; Police Recovered Keys).