Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

End of Bibblio RCM includes -->

Did 4 Major Ransomware Groups Truly Form a Cartel?

An analysis of well-known extortion groups and their cryptocurrency transactions reveals the answer.

A collection of ransomware groups that banded together to create a "cartel" rarely collaborate and don't share profits, suggesting that concerns over a sprawling cybercriminal organization are overblown, according to Analyst1.

The four cybercriminal groups — Twisted Spider, Viking Spider, Wizard Spider, and the Lockbit Gang — announced at different times throughout summer 2020 that they would be working together but gave few other details. By November, when Twisted Spider — also known as the Maze group — closed down, it denied there had ever been a cartel.

Related Content:

Pay-or-Get-Breached Ransomware Schemes Take Off

Special Report: How Data Breaches Affect the Enterprise

New From The Edge: 9 Modern-Day Best Practices for Log Management

In a nearly 60-page report, Jon DiMaggio, a former contractor for the National Security Agency (NSA) and now chief security strategist at threat intelligence firm Analyst1, investigated whether the groups had actually joined forces. While he documented their sharing of data breach information, cross-posting of data, and sharing of techniques, he never saw any revenue sharing or coordination between the groups, he says.

"If you go look up what a cartel is ... the one driving theme is when these organizations work together and share profits with one another," DiMaggio says. "What I did not ever see, even one time, is one gang paying another gang. At the end of the day, they can call themselves a cartel, but I don't think they are a cartel."

The report delves into the convoluted details of the past year, a time during which ransomware attacks more than doubled. In May 2020, Twisted Spider announced it had joined with the LockBit group to form a cartel to "share their experience and data leak platform," according to one report.

Yet the groups only appeared to share their data leak sites — on which victims' information is posted — and some infrastructure, according to the Analyst1 report.

"There needs to be more than cooperation, resource, and tactic sharing between gangs for their partnership to qualify as a true Cartel, though," the report states. "Profit-sharing is the primary element missing in the coalition of ransomware attackers discussed. Cartels are dangerous due to the large financial resources that profit-sharing provides."

To some extent, the cartel announcement appeared to be ransomware gangs trying to garner media attention. All four groups appeared to reach out to journalists and even made public statements. In particular, if a company refused to pay, Twisted Spider issued press releases criticizing companies, and Viking Spider — which infected victims with Ragnar Locker — used Facebook ads and a "wall of shame." 

Concerns of criminal prosecution may have led to both the shutdown — or, more accurately, the renaming — of the Maze group as Egregor and the refutation that the groups were cooperating, the report stated.

"[T]he evidence ... supports the theory that Twisted Spider and other gangs do work together," the Analyst1 report states. "Both their retirement and backtracking on the Cartel affiliation after months of promoting it was likely an attempt to throw off researchers and law enforcement."

While the scant collaboration between the groups appears not to pose a threat, the groups are becoming more dangerous by reinvesting revenue into improving their ransomware operations. This includes expanding automated operations and regularly updating malware with more advanced features — both of which make the ransomware gangs more dangerous, says DiMaggio. 

Wizard Spider, the most experienced group and commonly associated with Trickbot and the Ryuk ransomware, has created an automated system for infecting and updating the victim organization's systems. While most ransomware attacks take several days or weeks from the initial compromise to "pull the trigger" and initiate the ransomware, automation could bring that down to hours, he says.

"In general, ransomware is currently a very manual process, but they are working diligently to close the time gap using automated techniques," he says.

The Lockbit Gang, the fourth member of the "cartel," invests a lot of time in automating its process. In one case, the attacker infected a system, extended the compromise, and executed the ransomware in less than two hours, according to the report. 

The gang pretends to be a support service, helping companies recover from the crypto-malware for a fee — that is, the ransom.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
ryuuseika
ryuuseika,
User Rank: Apprentice
4/8/2021 | 7:39:49 AM
coalition
"Twisted Spider, Viking Spider, Wizard Spider and the Lockbit Gang" cartel or no cartel This is a false debate in my opinion.
The real question is:
when will there be a real international coalition to fight cybercrime?
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file