This lure of quickly making large sums of money is attracting interest from across the cyber-criminal spectrum, from sophisticated gangs specialising in ransomware attacks, to affiliate schemes where wannabe ransomware kingpins can lease out ransomware as a service in exchange for a cut of the profits.  It’s also attracted low-level cyber criminals, who see an opportunity to grab a slice of the ransomware pie – even if they have little idea what they’re doing.  SEE: A winning strategy for cybersecurity (ZDNet special report) Cybersecurity researchers at Abnormal Security have detailed an amateur ransomware campaign using social engineering in an attempt to fool employees into installing DemonWare ransomware on their organisation’s network, in return for a slice of the payout. DemonWare ransomware – also known as Black Kingdom and DEMON – is one of the least sophisticated forms of ransomware around, but that hasn’t stopped cyber criminals trying to use it.  In this instance, the attacker uses LinkedIn and other publicly available information to identify targets and reaches out to them by email, asking if they want to install DemonWare ransomware on the network in exchange for a million dollars – a 40% cut of a $2.5 million ransom.   The attacker leaves an email address and a Telegram username for interested parties to contact – which researchers did, using a fictitious persona, in order to find out more about the campaign and those behind it.  It quickly became apparent that the ransomware attacker wasn’t the most sophisticated cyber criminal in the world, and they quickly lowered the proposed cost of the ransom down to $120,000. For the attacker, however, that would still be a lot of money.  “Like most financially motivated cyber criminals, this actor is simply trying to make any amount of money from this scam. Although he quickly pivoted to a much lower ransom amount over the course of our conversation, $100,000 or $1 million would both be a life-changing amount for him,” Crane Hassold, director of threat intelligence at Abnormal Security, told ZDNet.  The attacker claimed that the person responsible for installing ransomware on the network wouldn’t be caught, claiming that DemonWare would encrypt everything, including CCTV files. Researchers note that this approach suggests the attacker is “not very familiar with digital forensics or incident response investigations”.  But analysis of the files sent by the attacker confirmed that they’re really attempting to distribute a working version of DemonWare ransomware. The attacker claims that they’ve coded the ransomware themselves, but this is a lie – DemonWare is freely available to download from GitHub, its actual author having placed it there “to demonstrate how easy ransomware are [sic] easy to make and how it work [sic].”  The attacker’s self-coding claims are likely just another part of the attempt to persuade people to go through with the scheme. According to the attacker, they’ve successfully encouraged people to help them to deploy ransomware, although their claims are unlikely to be trustworthy.  But who is this wannabe ransomware attacker? By using the email and Telegram contact details they provided in their initial message, researchers were able to trace them to a trading website for Naira, the currency of Nigeria, as well as a Russian social media platform. When presented with this information in messages, the attacker confirmed they are Nigerian – which might explain the initial attempts at social engineering.  SEE: Cybersecurity: Let’s get tactical (ZDNet special feature)  Cyber criminals working out of Nigeria tend to focus their efforts around phishing and business email compromise (BEC) attacks, but in this case, they’ve taken what they know and attempted to apply it to ransomware.  “Knowing the actor behind this campaign is Nigerian really adds a lot of context to the tactics he’s using. For years, cyber criminals in Nigeria have used basic social engineering techniques to commit a wide variety of scams, so it makes sense that this actor is trying to use the same tactics to deploy ransomware,” said Hassold  “It seems this actor is trying to jump on the ransomware bandwagon due to the attention recent attacks have gotten in the media; however, he’s adapted historical ransomware delivery methods to fit within the attack framework he’s likely used to,” he added.  While this attacker might not be very successful, other more experienced ransomware operations benefit from finding insiders to help them gain access to networks. For example, LockBit ransomware – which has surged in popularity in recent months – regularly advertises for insiders to help carry out campaigns.  To help prevent the network from being compromised with ransomware – be it via an outside intrusion or an insider threat – information security teams should limit permissions of users unless it’s necessary for them to have admin privileges. This can prevent cyberattacks from exploiting regular user accounts as a means of gaining access to key parts of the network.  Regularly applying security patches, enforcing the use of multi-factor authentication and storing offline backups can also help prevent disruptive ransomware attacks. 

MORE ON CYBERSECURITY

Business email compromise: 23 charged over ‘sophisticated’ fraud ringRansomware: These are the two most common ways hackers get inside your networkNew DOJ task force to take on ransomware, says reportHave we reached peak ransomware? How the internet’s biggest security problem has grown and what happens nextThis major ransomware attack was foiled at the last minute. Here’s how they spotted it