BlackCat Ransomware Group Implodes After Apparent $22M Payment By Change Healthcare (krebsonsecurity.com) 54
An anonymous reader quotes a report from Krebs on Security: There are indications that U.S. healthcare giant Change Healthcare has made a $22 million extortion payment to the infamous BlackCat ransomware group (a.k.a. "ALPHV") as the company struggles to bring services back online amid a cyberattack that has disrupted prescription drug services nationwide for weeks. However, the cybercriminal who claims to have given BlackCat access to Change's network says the crime gang cheated them out of their share of the ransom, and that they still have the sensitive data Change reportedly paid the group to destroy. Meanwhile, the affiliate's disclosure appears to have prompted BlackCat to cease operations entirely. [...]
The affiliate claimed BlackCat/ALPHV took the $22 million payment but never paid him his percentage of the ransom. BlackCat is known as a "ransomware-as-service" collective, meaning they rely on freelancers or affiliates to infect new networks with their ransomware. And those affiliates in turn earn commissions ranging from 60 to 90 percent of any ransom amount paid. "But after receiving the payment ALPHV team decide to suspend our account and keep lying and delaying when we contacted ALPHV admin," the affiliate "Notchy" wrote. "Sadly for Change Healthcare, their data [is] still with us." [...] On the bright side, Notchy's complaint seems to have been the final nail in the coffin for the BlackCat ransomware group, which was infiltrated by the FBI and foreign law enforcement partners in late December 2023. As part of that action, the government seized the BlackCat website and released a decryption tool to help victims recover their systems. BlackCat responded by re-forming, and increasing affiliate commissions to as much as 90 percent. The ransomware group also declared it was formally removing any restrictions or discouragement against targeting hospitals and healthcare providers. However, instead of responding that they would compensate and placate Notchy, a representative for BlackCat said today the group was shutting down and that it had already found a buyer for its ransomware source code. [...] BlackCat's website now features a seizure notice from the FBI, but several researchers noted that this image seems to have been merely cut and pasted from the notice the FBI left in its December raid of BlackCat's network.
Fabian Wosar, head of ransomware research at the security firm Emsisoft, said it appears BlackCat leaders are trying to pull an "exit scam" on affiliates by withholding many ransomware payment commissions at once and shutting down the service. "ALPHV/BlackCat did not get seized," Wosar wrote on Twitter/X today. "They are exit scamming their affiliates. It is blatantly obvious when you check the source code of their new takedown notice." Dmitry Smilyanets, a researcher for the security firm Recorded Future, said BlackCat's exit scam was especially dangerous because the affiliate still has all the stolen data, and could still demand additional payment or leak the information on his own. "The affiliates still have this data, and they're mad they didn't receive this money, Smilyanets told Wired.com. "It's a good lesson for everyone. You cannot trust criminals; their word is worth nothing."
The affiliate claimed BlackCat/ALPHV took the $22 million payment but never paid him his percentage of the ransom. BlackCat is known as a "ransomware-as-service" collective, meaning they rely on freelancers or affiliates to infect new networks with their ransomware. And those affiliates in turn earn commissions ranging from 60 to 90 percent of any ransom amount paid. "But after receiving the payment ALPHV team decide to suspend our account and keep lying and delaying when we contacted ALPHV admin," the affiliate "Notchy" wrote. "Sadly for Change Healthcare, their data [is] still with us." [...] On the bright side, Notchy's complaint seems to have been the final nail in the coffin for the BlackCat ransomware group, which was infiltrated by the FBI and foreign law enforcement partners in late December 2023. As part of that action, the government seized the BlackCat website and released a decryption tool to help victims recover their systems. BlackCat responded by re-forming, and increasing affiliate commissions to as much as 90 percent. The ransomware group also declared it was formally removing any restrictions or discouragement against targeting hospitals and healthcare providers. However, instead of responding that they would compensate and placate Notchy, a representative for BlackCat said today the group was shutting down and that it had already found a buyer for its ransomware source code. [...] BlackCat's website now features a seizure notice from the FBI, but several researchers noted that this image seems to have been merely cut and pasted from the notice the FBI left in its December raid of BlackCat's network.
Fabian Wosar, head of ransomware research at the security firm Emsisoft, said it appears BlackCat leaders are trying to pull an "exit scam" on affiliates by withholding many ransomware payment commissions at once and shutting down the service. "ALPHV/BlackCat did not get seized," Wosar wrote on Twitter/X today. "They are exit scamming their affiliates. It is blatantly obvious when you check the source code of their new takedown notice." Dmitry Smilyanets, a researcher for the security firm Recorded Future, said BlackCat's exit scam was especially dangerous because the affiliate still has all the stolen data, and could still demand additional payment or leak the information on his own. "The affiliates still have this data, and they're mad they didn't receive this money, Smilyanets told Wired.com. "It's a good lesson for everyone. You cannot trust criminals; their word is worth nothing."
Good. (Score:3)
So that means... (Score:2)
That criminals won't keep their word... colour me shocked!
Re: (Score:2)
There is no honor among thieves. - Proverbs 1:16
Re: (Score:2)
Is that the actual Proverbs 1:16 text (even amongst its many translations)?
Re: So that means... (Score:2)
Re: (Score:2)
When I was a kid, if we wanted to invent a bible quote we'd always declare some random chapter and verse from the "Book of Hezekiah".
Re: So that means... (Score:2)
Re: (Score:2)
No, per another reply - I thought it was in the bible, did a quick search (but didn't vet the link) that returned Proverbs 1:16.
So, I was sloppy.
Re: (Score:2)
Thanks for the response. I did the same searching and found the same [apparent] claim online. Various sites claim "no hono[u]r among thieves" as the meaning of Proverbs 1:16, but that seems highly iffy. Good ol' Biblical bull!
Re: (Score:2)
Re: (Score:2)
Is that the actual Proverbs 1:16 text (even amongst its many translations)?
No. According the King James version: For their feet run to evil, and make haste to shed blood. With one or two exceptions, all the various versions of the little book [biblehub.com] say the same thing.
Re: (Score:2)
Is that the actual Proverbs 1:16 text (even amongst its many translations)?
No idea - I thought it was from the bible, and when I typed the quote into a search engine it returned "Proverbs 1:16" as the top result. ...which I didn't click into and apparently was wrong, if the post further down is accurate.
Re: (Score:3)
That criminals won't keep their word... colour me shocked!
Up to now, the whole ransomware scheme has functioned on the premise that if a company pays the ransom, they will get the keys to unlock their data and BlackCat will delete whatever data they have. If BlackCat is cheating their 'partners' who still have access to the data and can still cause problems for the target then future ransomware targets will reconsider paying the ransom. Enough companies refuse to pay and the entire scheme will implode.
No way! (Score:2)
Cyber criminals cheat other cyber criminals out of money and don't keep their word to the ransomee?
Nickcageyoudon'tsay.gif
Honor among thieves (Score:1)
Rug pulling (Score:1)
Comment removed (Score:4, Interesting)
Re:Genuinely curious (Score:4, Interesting)
Sandboxing and detonating all inbound web content as well as application allow listing would probably have prevented this.
The problem is that operating systems come pre-installed with hundreds of admin tools and scripts meant for the enterprise admin professionals. But those same tools make it just as easy for an attacker to learn about the environment.
That's where gray listing can really help. If you put the pre-installed admin tools behind an elevation prompt, that would stop 99.999% of these intrusions in their tracks.
There is no reason for a standard user to be running powershell.exe, wmic.exe, csc.exe, reg.exe, cmdkey.exe, esentutl.exe, certutil.exe, at.exe, netsh.exe or any of the other built-in Windows admin utilities. Put those things behind a credential prompt and see how easily that malware spreads.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sandboxing and detonating all inbound web content as well as application allow listing would probably have prevented this.
Effective layered back-up would solve the ransomware problem.
Would not solve the disclosure problem, but then, as pointed out in the article, you can't trust the criminals to delete your data merely because you paid them millions to delete your data.
Re: (Score:2, Interesting)
There is no reason for a standard user to be running powershell.exe, wmic.exe, csc.exe, reg.exe, cmdkey.exe, esentutl.exe, certutil.exe, at.exe, netsh.exe or any of the other built-in Windows admin utilities. Put those things behind a credential prompt and see how easily that malware spreads.
Trivially.
A windows client computer can't authenticate users without communicating with a domain controller.
It isn't possible to both allow and deny a client computer from communicating with a domain controller.
The malware comes in by a user requesting it to in most all cases. It runs as that user.
There it has access to the networks domain controllers for that client.
It then fires off a series of zero day exploits against the domain controller in an attempt to gain some access to it.
Once running on the DC,
Re:Genuinely curious (Score:5, Informative)
All it takes is a basic executable.
On a PC level, it's easy - the malware runs, and it basically starts encrypting every file it can - it enumerates all the files on the hard drive, then attempts to encrypt every file it can. It often then adds an executable header.
The executable header then determines if the PC it's running on is infected - if it is, it then pops up a alert saying the file is encrypted. If not, it then infects the PC and then shows the alert. And the infected PC then begins encrypting every file it has access to.
The way it spreads is because the encryption can prioritize certain files - things in your user directory are almost always writable by the user, as well as looking at what network shares you have access to and accessing and encrypting those files.
Sometimes the infection can be sneaky by encrypting all the files first, but silently decrypting them for the first few days so no one knows its there. Then boom, all at once, it goes off.
And yes, it's possible to restrict its actions - many antimalware software can detect this behavior of opening, encryptiong/writing, deleting/renaming files especially if it happens on a large number of files at once (you don't change many files every day). The problem is, this is behavioural pattern so you still can encrypt a few files before it gets caught.
You can also lock down what network files a user can write to, but you have to balance lockdowns against productivity - users need to write files to network shares because it's often being shared among several people.
Re: (Score:2)
Re: (Score:2)
A lot of Ransomware checks for installed Russian keyboard support, if that is present then it does not bother going any further. I would install that, except that my Windows machine does not have an email client set up - I only use it for specific tasks - so I don't see the need.
Re: (Score:2)
Re: (Score:2)
This assumes that any given workstation has the ability to run random executable content from the web.
In this day and age, there is absolutely no reason whatsoever for computers that are subject to corporate governance to allow execution of untrusted content.
Re: (Score:2)
I worked for one of the related companies just over a decade ago. I don't know what it is like now, but back then it was awful to work there. They insisted on Windows for everyone even though development was for mainframes or RH Linux servers. The bureaucracy was insane. Policy was king, even if it didn't make sense (this part is still true now.) The hoops we had to jump through to get our work done was silly. Low and middle managers had zero power and traded seats once per year. Top management didn't
Re: (Score:2)
It's too big a catch (Score:2)
I'm surprised we haven't really cracked down on these guys. All it would take is some anti-money laundering laws around crypto currency. I guess the crypto bros have enough money to keep those laws from being enforced now. Too many politicians taking their money. And too many "small gov't" weirdos who get really upset about law enforcement unless it's a thug in blue crac
Re: It's too big a catch (Score:4, Insightful)
Pretty much all money laundering laws that apply to USD apply to cryptocurrency. Which laws do you think would actually have an impact?
Or are you just one of those people who is alright with money laundering as long as it happens in USD?
Re: (Score:2)
Re: It's too big a catch (Score:2)
Why is it legal to pay the ransom? (Score:4, Insightful)
Re: (Score:2)
https: [state.gov]
Re: (Score:3)
>> The company should have spent the 22 million on security
They probably use Windows and Outlook.
No hope any spending whatsoever will change anything.
Re: (Score:2)
Re: (Score:2)
The company should have spent the 22 million on security and good backup strategy.
The Capitalist mindset is [[ $penalty < $profit ]] && ok
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
then then the people responsible at the company to prevent/mitigate the effects should be fired.
Really? As an architect, I know we should do it, but my boss's boss's boss tells us that something might be added in the budget for next year.
And you want ME to get fired?
Blame the hospital (Score:2)
The hospital deserves to have all the data leaked. Stop fucking paying ransom, you worthless shits.
Re: (Score:2)
You ever worked with a hospital? I've only done it 3 times but damn dude these are the shittiest IT orgs I've ever worked with.
One of them I was on a call with the exec in charge of all data and responsible for all HIPAA compliance across a 6 hospital group. She was beating me up over us not having any sort of HIPAA controls (we mostly did financial data) and then cuts herself off, laughs, and says, "Oh, never mind, it's fine, we're not compliant, either!" Jfc.....
When you work with criminals... (Score:3)
There is no honor among thieves (Score:2)
Has no one heard of the quote: " There is no honor among thieves.". Sheesh...
Key takeways (Score:1)
Unless you have the capacity and capability to render sufficient violence, organized crime will always betray you.
Giving criminals and terrorists what they want only emboldens the criminals and terrorists (hence why the ceasefire-now cowards are just pro-Hamas scum).
omg (Score:2)
OMG, no honor among thieves!
No honor among theives (Score:3)
What people do and what motivates them to do what they do is different for everyone. Some may be in this dark twisted path because it's the only thing they have and they are just trying to put food on the table. Certainly these financial gains comes at the expense of others and unfortunately this is the way of the world for many others living on the other side of the train tracks. :-/
No honor (Score:1)