Home » This devious attack could be the next evolution of ransomware

This devious attack could be the next evolution of ransomware

0 comment

A ransomware operator has created a fake website of one of its victims and used it to publish sensitive content stolen in a ransomware attack. 

The approach is a novelty that some security researchers believe to be a way of weaponization of the victim’s clients.

Threat actors known as ALPHV (also known as BlackCat), recently successfully launch a ransomware attack against a financial services company, making off with 3.5GB of sensitive documents, including staff memos, payment forms, employee data, assets and expenses, financial data for partners, passport scans, and similar.
Typosquatted domains

The threats of leaking the data to the public obviously didn’t work with the victim company, which evidently decided not to pay the ransom demand. 

However, ransomware operators usually leak stolen data on the dark web, where it’s available mostly to other criminals and security researchers. This time around, ALPHV created a website on a typosquatted domain, which looks and feels almost identical to the legitimate website of the victim.

Read more

> What is ransomware and how does it work?> You’re a ransomware victim: Here’s 5 things you should do> Here are the best malware removal tools around

Speaking to BleepingComputer, threat analyst at Emsisoft, Brett Callow, said leaking the data via a typosquatted domain could be a more damaging approach: “I wouldn’t be at all surprised if Alphv had attempted to weaponize the firm’s clients by pointing them to that website” Brett Callow said.

We will have to wait and see what the results of this approach would be, but it’s safe to assume that if it’s successful, we’ll be seeing a lot more typosquatted websites leaking sensitive corporate data. 

Ransomware is an ever-evolving threat. At first, the attackers would simply encrypt all of the files on target endpoints and demand payment in bitcoin. 

When businesses started deploying backups, the criminals started stealing sensitive data and threatening to leak it online. In some cases, this attack is also followed by a Distributed Denial of Service (DDoS) attack that disrupts the front-end, as well as intimidation and persuasion via telephone and email.

Here are the best endpoint protection services right now

Via: BleepingComputer

You may also like

Leave a Comment


Cybernonstop is created to bring news and knowledge through articles to visitors.

Do not forget to subscribe.

Laest News

@2021 – All Right Reserved. Designed and Developed by PenciDesign