CybersecurityInternetSecurity

REvil UNDER THE MAGNIFYING GLASS

0

REvil has been one of the most prolific ransomware-as-a-service campaigns in recent memory. Bitdefender Labs illuminates the background.

REvil has operated very successfully with ransomware-as-a-service. Thousands of technology companies managed service providers and organizations from various industries worldwide were among the victims. The cooperation between security authorities and IT experts led to great success in the second half of 2021. Joint efforts were necessary because the cybercriminals also cooperated successfully. The experts at Bitdefender Labs take stock of the – perhaps only temporary – failure of a successful wave of ransomware-as-a-service.

Most recently, international investigators struck heavy blows against the criminal REvil backers: In the course of a raid in November 2021, the US Department of Justice arrested so-called affiliates, i.e., partners or participants in the REvil network, and confiscated around six million US dollars in ransom money. Then, in January 2022, Russia’s domestic intelligence agency FSB and Russian police arrested fourteen other suspected REvil members and seized additional multimillion-dollar financial assets.

Ransomware as a business model

In the eyes of the Russian authorities, one of the most successful ransomware groups with annual sales of 100 million US dollars and a market share of 16.5 percent has been crushed. The RaaS operators attacked various industries—most notably manufacturing, legal services, and construction to achieve such a result. The deal initially thrived and secured large profits for those involved: Bitdefender estimates that around ten core members and approximately 60 other partners took part in the actions at peak times. The latter received about 70 to 80 percent of the profits.

A mature company

REvil exemplarily shows the power and degree of organization of criminal ransomware-as-a-service models. In the affiliate network, developers, the attackers, and those who carried out the penetration tests and the ransom collectors worked closely together. They thought about the infrastructure to collect agreed amounts. They even set up support for victims who were willing to pay: they could pay the ransom via a portal. In addition, the criminal service employees advised the attacked organizations on acquiring cryptocurrencies or helped them use the TOR browser.

The criminal milieu also rewards competence.

Quality distinguishes itself in the informal economy. This was evident in the REvil group: the better the malware code and the associated services became, the more professional partners joined the successful model. Further improvements brought even more rewarding targets within the attacker’s reach. The actors obtained higher ransoms, which they immediately reinvested in the RaaS: new services or new staff. The criminal associates were often sought-after professionals who moved from one affiliate partner to another.

Victim dialogue as customer communication

The cybercriminals addressed their victims like a customer. So they demanded the ransom according to a fixed pattern; only the keys and the URL differed. The ransom collectors also tried to inspire confidence in the victims. A personalized salutation (“Welcome <company name>”) was considered “good manners”. From the beginning of 2020, the attackers then gave a supposed guarantee that their own REvil decryptor would work better than that of another criminal organization. It promised a recovery rate of nearly 100% compared to just 87%.

Staged Threats

On the other hand, the RaaS partners built a multi-layered threat potential in which encryption was just one part of several. Concerning the European General Data Protection Regulation, they threatened to encrypt data and disclose it, which would have resulted in an obligation to report, damage to your image that should not be underestimated and, in the worst case, a fine. If the ransom was not paid, the criminals systematically increased the pressure, published leaked data, and then demanded a ransom to stop this process. The third level of escalation was distributed denial of service attacks on the victims and their business partners.

The REvil collapse

In addition to the pursuit pressure and the availability of decryptors also developed by Bitdefender, internal factors also contributed to slowing down the success of REvil from autumn 2021. A work-sharing process like RaaS is based on the reputation and mutual trust of those involved, and the REvil initiators lost the necessary reputation within the cyber-criminal community. On the other hand, the attack on the healthcare industry or pharmaceutical manufacturers and drug researchers during the pandemic were not without controversy among the criminal semi-public.

Joint and international defense works

The REvil complex has shown that only a standard answer helps against a group of cybercriminals: on the technical side, a combination of technologies and services such as managed detection and response (MDR), heuristic analysis, and machine learning on the one hand, as well as knowledge and expertise and intuition of the IT security experts on the other hand. Tools like decryptors also contributed. With the decryption tool released by Bitdefender in autumn 2021, 1,400 companies could decrypt files with a total value of half a billion US dollars themselves. On the personnel side, close cooperation between state and private sector actors in IT security is essential. And that worldwide, because cybercrime knows no national borders.

MAKE NETWORKS RESILIENT

Previous article

TECHNICAL DEBT IS RISING – AND THAT’S A GOOD THING

Next article

Comments

Leave a reply

Your email address will not be published. Required fields are marked *

You may also like