
In Private Conversation, Hackers Behind Ransomware Outbreak Lower Demand To $50 Million (reuters.com) 68
The hackers who have claimed responsibility for an international ransomware outbreak have lowered their asking price in a private conversation with a cybersecurity expert, something he said may be a sign the group was having trouble monetizing their massive breach. From a report: The REvil ransomware gang, also known as Sodinokibi, is publicly demanding $70 million to restore the data it's holding ransom after their data-scrambling software affected hundreds of small and medium businesses across a dozen countries - including schools in New Zealand and supermarkets in Sweden. But in a conversation with Jack Cable of the cybersecurity-focused Krebs Stamos Group, one of the gang's affiliates said he could sell a "universal decryptor" for all the victims for $50 million. Cable told Reuters he managed to get through to the hackers after obtaining a cryptographic key needed to log on to the group's payment portal. Reuters was subsequently able to log on to the payment portal and chat with an operator who said the price was unchanged at $70 million "but we are always ready to negotiate."
Better idea. (Score:4, Insightful)
Make paying ransom carry a fine equal to three times the ransom, because you're funding criminal activity and suffering the consequences of mismanaging your IT security.
Re: (Score:2)
It's not like someone is taking a suitcase full of cash to Gorky Park to pay them. The banks are partly responsible for this and ought to be preventing it from happening.
Re: (Score:2)
You have a twisted, incoherent, bizarre definition of "responsible".
Re: Better idea. (Score:2)
remind me not to let you drive the bus, less you veer off into some random direction.
Re: (Score:2)
You have a twisted, incoherent, bizarre definition of "responsible".
It's the prevailing view in the US and EU and there are sanctions against Russian banks already in place.
Re: (Score:2)
It's quite simple-- the feds just need to mine enough bitcoin to mount a 51% attack.
Re: (Score:2)
It's quite simple-- the feds just need to mine enough bitcoin to mount a 51% attack.
Or. The combined value of all Bitcoin is US$650 billion... Let's say you're the gubermint, printing fiat money like a counterfeiter with a meth habit... for less than the price of an infrastructure bill, or a Covid relief package, you could easily afford to corner the Bitcoin market and devalue the cryptocurrency by using the rest of it to light cigars, once you're finished spraying most of it with perfume to use as the poor man's bidet.
Re: Better idea. (Score:2)
Re: (Score:2)
You'd think, but ponder for a moment the power a sovereign government has... okay, not just any sovereign government but one with a lot of economic sway like the US, or the EU, or japan and Korea, or, or, China.
In point, what happened to the Bitcoin's value when China shrugged its shoulders?
Re: (Score:2)
So what happens when they demand ransom paid in XMR instead?
Re: (Score:2)
Much of the colonial pipeline ransom was ostensibly recovered using a blockchain explorer, so perhaps XMR will be the currency of choice. However bitcoin can be purchased at the same place you can buy giiftcards, so there's a tradeoff.
Re: (Score:2)
Can't some make a report that is based off the blockchain, and declare those coins to be tainted money.?
seems like a perfect way to lock theft coins in it's owe ecosystem.
I kind of think of it as a IP spam filter where, you just check against.
I am sure that at this time XMR is not subject to this, yet, at this size of transaction it just might be.
Re: (Score:2)
XMR won't even allow you to view the contents of a wallet without permission of the owner. You might think a large portion of XMR turning up somewhere would be an indicator of wrongdoing, but how would you know? The only way you could really watch for it would be at an exchange during cash-out.
Re: Better idea. (Score:2)
Could any authority require an audit for any XMR over some threshold that appears without a trace? Or would that again be something that could only be enforced at an exchange?
Re: (Score:2)
Actually, that seems like the most likely long term outcome.
The USA issued can issue regulation about it that are
enforceable within the banking and exchange system on the domestic market.
Re: (Score:2)
It's like any other encrypted source of information. You can issue a subpoena to unlock the wallet contents (XMR has functions that permit auditing in this fashion). That that point it's up to the recipient as to whether or not they obey a court order.
The question is: how do you tie the wallet to the person in order to issue the subpoena? It's a public blockchain, and it's designed to frustrate attempts at centralized oversight.
Re: Better idea. (Score:2)
Sanction the country where money ends up with.
Problem will fix itself.
Re: (Score:2)
Re: (Score:2)
Here is the rub though. The entire thing way to public, it has become an affront to every police force, internationally, it has developed into a real focal point for every single investigatory agency planet wide. They are in it and in it deep, real deep. No place safe, no place to hide, policing has gone red hot on it.
It is dumb stuff like this by criminals, that sets global precedents for international treaties and pursuit of law enforcement and the threat not to the end users but the authority of police
Re: (Score:2)
Re: (Score:2)
Worked for Manuel Noriega [wikipedia.org] so it should for this.
Re: (Score:2)
Do you really want to set the precedent of "Your country has criminals so we're allowed to declare war without consequences"?
Re: Better idea. (Score:2)
US has already set that precedent a couple times. I mean, thatâ(TM)s pretty much Afghanistan in pursuit of Taliban and bin Laden, yes?
Re: (Score:2)
Re: (Score:2)
> It's not like someone is taking a suitcase full of cash to Gorky Park to pay them.
CRYPTOlocker. It's right in the name.
Re: (Score:2)
You'd think I would have seen that.
Re: (Score:2)
I think you might mean bitcoin exchanges. They would know what wallets have the coin and could potentially blacklist any exchanges from accepting those wallets. Problem with that is you could split the coin across many wallets infinitum.
On a related note, didn't the US govt find the coins paid for the pipeline ransome? Maybe they'll get lucky again.
Re: (Score:2)
The banks have nothing to do with the popularity of ransomware, because it's entirely enabled by cryptocurrency. Stomp on the cryptos using whatever 3-letter agency methods we can dream up, and the problem goes away.
Re: (Score:2)
Re: (Score:2)
I agree that nobody should pay the ransom, but it is harder than you think to secure an organization against this sort of attack. In fact, it's basically impossible without giving up flexibility and efficiencies that we have take for granted.
Employees need access to the internet. Employees need access to a large confidential data set. Even with the best of training, some will be fooled by an email or other vector for ransomware, giving malware access to both the internet and the confidential data set. A de
Re: (Score:1)
Re: (Score:1)
It's not always mismanagement. There's a reason why hackers pay top dollar for 0-day flaws.
Re: (Score:2)
You're a child who doesn't understand the value of information encrypted, and cost of sensitive ex filtrated data being posted far outweighs the ransom cost in many cases so businesses pay.
Re: (Score:2)
If you can spend millions on ransom you can spend millions on IT security.
Re: (Score:2)
Re: (Score:2)
That is obvious if you are not the person who authorises CXO bonuses.
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:1)
which is why it needs to be made illegal to pay.
Absolutely agree. You cannot negotiate with terrorists, and that's what these people are - terrorists.
Paying out the ransom does nothing to tighten IT security, it gives the company an out, let's them sweep their IT ineptitude and lack of proper security under the rug.
It should be illegal to pay them, illegal to not report all of it, and even more illegal not to prevent it in the future.
If it happens twice to the same company they should either be nationalized or shut down permanently.
Re: (Score:2)
words on paper will do nothing, companies will get their data back and protect their reputation. Tracking down the ransonware criminals and shooting them in the face would work though, but pansies only think of making more useless laws.
Re: (Score:2)
Re: (Score:1)
So you're saying that everyone who was subject to the Solar Winds attack was mismanaging their IT security? Same with everyone who used Kaseya?
Re: Better idea. (Score:1)
Re: (Score:2)
Re: Better idea. (Score:2)
The US and allies should assassinate a few of these shitheads and let the world know who did it and why.
Re: (Score:2)
The ransomers would just lower their prices so that the total amount (ransom + fine) was affordable.
Krebs v. Krebs (Score:1)
Can we get Chris to change his surname because every time I see "... security... Krebs.." I have to read the article to find out whether this is Brian Krebs (automatic must-read) or the other Krebs (eh, whatever)?
Very Kind (Score:2)
We don't negotiate with terrorists (Score:2)
I wonder how long it will be before that becomes the policy, and the US uses it justify more severe economic, or even military, actions. Maybe the ransomware gangs know it too?
Ransomware attacks should be considered terrorism. (Score:3)
Kill any perps you can manage who fail to surrender.
It's perfectly fine to hurt enemies. That's all humans understand as we are a savage race. Failure to use savagery appropriately is weakness, not virtue. Enemy impunity must be reduced and since necessity knows no law, use any non-counterproductive method.
Law is for use between friends. We don't miss viri when we kill them.
Re: (Score:2)
History shows that harsh punishment is rarely much of deterrent. And in any case most of these guys are overseas in countries that don't give a shit, or even if they do care they will expect proper due process and won't extradite to places that might execute the accused.
Re: (Score:2)
History shows that harsh punishment is rarely much of deterrent. And in any case most of these guys are overseas in countries that don't give a shit, or even if they do care they will expect proper due process and won't extradite to places that might execute the accused.
Yep, the brutal regimes of North Korea, China and Iran have resulted in idyllic societies where nothing bad ever happens. The End.
Back in reality, prevention is better than cure. Even if you don't pay the ransom (which I firmly believe in, pay the Danegeld and you'll never be rid of the Dane) it is still cheaper to have a secure environment and good backups. I think the recent spate of cyber attacks are making companies wake up to the fact their cyber security is shite. Certainly there has been an increa
Re: (Score:2)
Re: (Score:2)
Make it Radioactive (Score:2)
That decentralized nature and it's global adoption means that Bitcoin is here to stay, like it or not. Even if the US were to turn round and outlaw all cryptocurrency, it would continue to operate in other nations unless there were a global moratorium. Given political tensions around the world, that seems unlikely.
The next best thin
This is what spy agencies are for (Score:2)