Cl0p Bust shows you exactly why Ransomware doesn’t go away
[ad_1]
On Wednesday, like US President Joe Biden and Russian President Vladimir Putin are preparing to meet in Geneva. The arrest of six suspects allegedly linked to the notorious Cl0p has been announced to enforce Ukrainian law. ransomware group. In collaboration with South Korean and U.S. investigators, Ukrainian authorities searched 21 homes in and around Kyiv, seized computers, smartphones and servers, and recovered $ 184,000 equivalent, which they believed was money to rescue the money.
Cl0p arrests are a very rare success as the ransomware crisis continues. The group has brought together several well-known victims since 2019, including Stanford University School of Medicine, the University of California and the South Korean e-commerce giant E-Land. And hackers they seem to be collaborating or bonding other cybercrime organizations, including the financial crime group FIN11 and a duplicate malware distribution organization TA505. The process of enforcing the law of cooperation was removed, but it also underscores why stopping the wider threat of ransomware remains a distant dream. This time he was willing to help Ukraine, but very little will change until Russia does the same.
Most of the ransomware actors that have been wreaking havoc in recent months are working outside of Russia, among others Ryuk, who committed massive hospital hacking in the United States last year, Dark side, which he threw down the colonial pipeline in May, and REvil, recently hit global meat supplier JBS and Apple supplier Quanta Computer. The U.S. Department of Justice has implicated Russian ransomware actors, but is working to catch them. And Putin has made it clear that for years – including the often-cited 2016 interview with NBC – as long as cybercriminals don’t break Russian law, he has no interest in prosecuting them.
“If you have a region in any country where you are lax in enforcing the law, I’m sure there will be enough people who want to do illegal things,” says Craig Williams, Cisco Talos ’outreach director. “We have these regions not only in Europe, but in regions like South America, where we have safe havens for cybercriminals to operate. So what we end up with is this model of aggression that is being allowed to be carried out online against private and civilian businesses that have no real purpose.”
Russia’s blind eye to cybercrime has been a problem for years, but the shameless hacking backed by the Kremlin states, from the election mix to expansive espionage operations, has drawn more attention. In the last 18 months, however, the severity and frequency of ransomware attacks around the world has shifted from a consistent problem to an urgent crisis. Attacks on critical infrastructure and supply chains have portrayed a serious picture of how far ransomware attackers will go to make money.
Following the culprits is often not as big an obstacle as catching them. If the US has it He implicated many Russian-based hackers and even managed to kidnap millions of dollars from the paid Colonial Pipeline. But acting on that information usually requires international cooperation. Russia has no extradition treaty with the US and apparently does not help. In fact, the Justice Department did not bother to ask Russian law enforcement for help in pursuing Colonial Pipeline hackers, John Demers, the assistant attorney general for national security, said in a speech recorded on June 3 and was released on Wednesday.
[ad_2]
Source link