Key Takeaway
Daniil Maksimovich Shchukin, the mastermind behind GandCrab and REvil, has been implicated in over 130 ransomware attacks. The impact caused significant economic damage, demanding refined defensive strategies.
What Happened
In a significant leap towards unraveling massive ransomware operations, German authorities have identified Daniil Maksimovich Shchukin as the mastermind behind the infamous GandCrab and REvil ransomware syndicates. Operating under the pseudonym "UNKN," Shchukin orchestrated devastating cyber-attacks harming businesses across Germany from 2019 to 2021. Law enforcement agencies, including the Bundeskriminalamt (BKA), have linked Shchukin and his partner, Anatoly Sergeevitsch Kravchuk, to numerous extortion attempts that amassed nearly €35 million in economic damages.
Shchukin's involvement in these ransomware operations came under increased scrutiny following a 2023 United States Justice Department filing that sought the seizure of several cryptocurrency accounts attributed to REvil's illicit activities. Authorities have identified more than €2 million in ransoms extorted through sophisticated cybercriminal operations tied to GandCrab and REvil.
Technical Details
GandCrab commenced its operations in January 2018, using an affiliate model enabling other hackers to breach systems and significantly expand their reach into corporate networks. GandCrab frequently updated its malware with features designed to circumvent defenses, implementing intricate obfuscation techniques that hindered detection by standard anti-malware solutions.
REvil emerged as GandCrab announced its shutdown in May 2019. It also operated an affiliate-based service emphasizing "big-game hunting," targeting corporations with extensive revenues or robust cyber insurance policies. The REvil gang famously exploited a vulnerability (CVE-2015-2862) in Kaseya's IT management software over the Fourth of July 2021 weekend, causing widespread chaos among its clientele. Indicators of Compromise (IOCs) include the presence of encrypted file extensions: .REvil or .GandCrab, alongside known Command and Control (C2) server IP addresses linked to the operations.
Impact
The impact of these attacks was sweeping, impacting over 1,500 businesses, governments, and nonprofit organizations globally, as seen in the Kaseya incident alone. The financial and operational damages were severe, compelling numerous organizations to halt operations temporarily and reassess their security postures. REvil's technique of double extortion further intensified the organization's leverage over victims, charging hefty prices to unlock encrypted data and threatening data leaks.
What To Do
- Regularly update and patch systems to mitigate known vulnerabilities like CVE-2015-2862.
- Deploy robust endpoint detection and response solutions for detection of unusual activities or patterns.
- Conduct comprehensive user education and phishing simulations to increase awareness about target vectors used by ransomware affiliates.
- Implement network segmentation and least privilege access to minimize damage from potential breaches.
- Set up comprehensive data backup and recovery solutions to ensure data integrity and availability.
Proactive measures and layered defenses are essential in safeguarding against such sophisticated cyber threats. Continuous monitoring and swift incident response capabilities can further mitigate the risks posed by formidable ransomware groups like GandCrab and REvil.
Related:
Original Source
Krebs on Security →Related Articles
Clop Ransomware Hits Major Manufacturing Firm
Manufacturer X was victimized by Clop ransomware, disrupting operations. Attackers exploited vulnerabilities in Microsoft Outlook and outdated Windows servers via phishing. Proactive security measures are vital.
Water Facility Targeted by Ransomware Amid ChatGPT Data Leak and Android Rootkit Discoveries
A water treatment facility was hit by ransomware exploiting a CVE-2023-34362 vulnerability, resulting in data encryption and leakage. Concurrently, a ChatGPT data leak exposed user logs, and a new Android rootkit exploiting CVE-2024-21045 was discovered. Additional security updates and FBI incident classifications were reported.
Scattered Lapsus ShinyHunters Ransomware Gang Uses Harassment and Swatting to Pressure Victims
Scattered Lapsus ShinyHunters (SLSH) employs phishing and MFA bypass to steal data, then uses harassment, swatting, and media manipulation to extort victims. Experts advise against paying ransom due to the gang's unreliable and aggressive behavior.
Ransomware Incident: Insider Locks Out 254 Servers in Extortion Attempt
A former engineer used retained access to lock out admins from 254 servers in a failed extortion attempt in New Jersey. The case emphasizes the risks of insider threats and inadequate offboarding procedures.