Fjern Rvwgm2wrld3.xyz Vis varsler. Fjern Rvwgm2wrld3.xyz Vis varsler?

Hvis du noen gang har lurt på hvor mye disse hackerne tjener, kan du få et glimt nå. i februar 27, 2022 en Twitter-konto ved navn @ContiLeaks og mange andre lignende kontoer begynte å legge ut ganske saftige detaljer om underverdenens penger og ansatte.

“jeg kjenner deg, du kjenner meg, vi kjenner oss”

The leaks mainly concern Gold Blackburn and Gold Ulrick and in more than 160,000 messages reveal communications exchanged among nearly 500 threat actors in the period between January 2020 and March 2022. In addition there were leaked source code and tool repositories; quite a fact to open the lid over previously unknown threat actors.

Among the other lekkede data were also dozens of dossiers on many threat actors with citizenship information, passport, bankkontonummer, telefonnummer, addresses, navnene, bilder. Cybersecurity specialists can’t determine the motives of the doers so far but they assume it could possibly be that some threat actors do not agree with pro Russian statements Gold Ulrick posted on its leak site. Their identity is not known as well.

What are Gold Ulrick and Gold Blackburn?

Most of the leaked data concerns two different but highly collaborative threat groups. They got their identification names from Secureworks® Counter Threat Unit™ (CTU) researchers who observed the activity referenced in the leaked data to be linked to Gold Blackburn and Gold Ulrick threat groups.

Gold Ulrick, a financially motivated cybercrime group, has been active since mid-2018. The group operated Ryuk ransomware from August 2018 until early 2021 and Conti ransomware from early 2020. They only target organizations with their ransomware.

Fjern Rvwgm2wrld3.xyz Vis varsler?
Personas mentioned in leaked messages and their assumed connections

Gold Blackburn, also a financially motivated cybercrime group, that has been active since June 2014. Trickbot malware, Buer Loader, Zloader, Anchor, BazarLoader all belong to the authorship of this group.

As being mentioned these are highly different threat groups but they show no less level of collaboration. CTU researchers observed operators of Conti and Ryuk ransomware to use BazarLoader, TrickBot or another malware payload issued by the Gold Blackburn threat group. Cobalt Strike Beacon and PowerShell Empire command and control (C2) servers used in the attacks conducted by the threat groups shared TrickBot and that could possibly be a sign of a single entity maintaining infrastructure for both. Which shows clearly one of the numerous close friendship signs among them.

But other threat groups have also used the malware like LockBit, Maze and RansomExx (også kjent som 777).

What has been revealed in Conti ransomware leak?

The leaked messaged as we said shone a light onto the underworld economy also revealing some previously unknown resources.

Having observed the leaked material, cyber security specialists made several assumptions about what has been leaked and what the specialists in their field could take from the information.

Sternpersona has been mentioned the most in the revealed messages. This account seems to be interacting with a wide circle of underworld employees making them the presupposed leader. According to messages this account makes key organizational decisions, manages crises, communicates with other threat groups and gives out payroll.

Fjern Rvwgm2wrld3.xyz Vis varsler?
Leaked payroll message from Mango persona to group leader Stern (translated from Russian)

Sternpersona also oversees ransomware distribution and BazarLoader, TrickBot operations. With such a wide list of responsibilities this reveals this account as the possible leader of both Gold Ulrick and Gold Blackburn.

In the messages were also mentioned the representatives of other threat groups and they were actively communicating with theSternpersona and other presupposed members of Gold Ulrick and Gold Blackburn as well. Blant dem: Gold Swarthmore (IcedID),Gold Mystic (Lockbit), Gold Crestwood (Emotet). But researchers warn that despite its connection to many groups mentioned, they can’t make suggestions that this person leads all the groups.

One of the conclusions researchers could make out of the leaks was that it certainly showed the mature well organized kriminelle økosystem involving many threat groups. Simply, they don’t work alone but help each other; you can even say it’s some kind of Evil Corporation that grew out in the underworld.

One of the messages that picked exceptionally the researchers interest, thoroughly a practical one, is the salary of cybercriminals. Ja, Selvfølgelig, Evil Corporation offers you paid leave, sick leave and many bonuses. From one leaked message we learn that on average individuals earn approximately $1,800 USD per month.

The salary exceeds the average Russian salaries of approximately $540 USD per month. As of July 1, 2021 the mentioned Bitcoin address at the bottom of the messages has received 2.31 bitcoins ( which amounts to approximately $80,000 USD at that time).

Statistics on ransomware

If you surprised by the fact that there’s actually a whole Evil Corporation exist then read the following stat on ransomware prepared by researchers from Purplesec to understand the actual scope this particular kind of cyber crime has taken:

  • Cybersecurity specialists estimated that every 14 seconds a business falls victim to a ransomware;
  • I 2019 with ransomware attacks increase of 41% 205,000 businesses lost access to their files;
  • Cybersecurity specialists detected 68,000 new ransomware Trojans for mobiles in 2019;
  • As of 2019, the number of new ransomware variants grew in 46%;
  • Social actions, such as phishing made up 21% of ransomware infection cases;
  • The volume of phishing emails that contain ransomware payload increased by 109% Over 2017;
  • I 2021 ransomware operators made the biggest known ransom demand of $100 million;
  • As of Q2 2021 (up 64% year-over-year) 121 ransomware incidents have been reported;
  • I 2021 ( increased by 82% year over year) the average ransomware payment made up nearly $570,000.

Reading all this stat you can imagine there’s more than one Evil Corporation and the sums climbing up the sky.

Andrew Nail

Cybersikkerhetsjournalist fra Montreal, Canada. Studerte kommunikasjonsvitenskap ved Universite de Montreal. Jeg var ikke sikker på om en journalistjobb er det jeg vil gjøre i livet mitt, men i forbindelse med tekniske vitenskaper, det er akkurat det jeg liker å gjøre. Min jobb er å fange opp de nyeste trendene i cybersikkerhetsverdenen og hjelpe folk til å håndtere skadelig programvare de har på PC-ene sine.

Legg igjen et svar

Tilbake til toppen-knappen