Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

End of Bibblio RCM includes -->

Did 4 Major Ransomware Groups Truly Form a Cartel?

An analysis of well-known extortion groups and their cryptocurrency transactions reveals the answer.

A collection of ransomware groups that banded together to create a "cartel" rarely collaborate and don't share profits, suggesting that concerns over a sprawling cybercriminal organization are overblown, according to Analyst1.

The four cybercriminal groups — Twisted Spider, Viking Spider, Wizard Spider, and the Lockbit Gang — announced at different times throughout summer 2020 that they would be working together but gave few other details. By November, when Twisted Spider — also known as the Maze group — closed down, it denied there had ever been a cartel.

Related Content:

Pay-or-Get-Breached Ransomware Schemes Take Off

Special Report: How Data Breaches Affect the Enterprise

New From The Edge: 9 Modern-Day Best Practices for Log Management

In a nearly 60-page report, Jon DiMaggio, a former contractor for the National Security Agency (NSA) and now chief security strategist at threat intelligence firm Analyst1, investigated whether the groups had actually joined forces. While he documented their sharing of data breach information, cross-posting of data, and sharing of techniques, he never saw any revenue sharing or coordination between the groups, he says.

"If you go look up what a cartel is ... the one driving theme is when these organizations work together and share profits with one another," DiMaggio says. "What I did not ever see, even one time, is one gang paying another gang. At the end of the day, they can call themselves a cartel, but I don't think they are a cartel."

The report delves into the convoluted details of the past year, a time during which ransomware attacks more than doubled. In May 2020, Twisted Spider announced it had joined with the LockBit group to form a cartel to "share their experience and data leak platform," according to one report.

Yet the groups only appeared to share their data leak sites — on which victims' information is posted — and some infrastructure, according to the Analyst1 report.

"There needs to be more than cooperation, resource, and tactic sharing between gangs for their partnership to qualify as a true Cartel, though," the report states. "Profit-sharing is the primary element missing in the coalition of ransomware attackers discussed. Cartels are dangerous due to the large financial resources that profit-sharing provides."

To some extent, the cartel announcement appeared to be ransomware gangs trying to garner media attention. All four groups appeared to reach out to journalists and even made public statements. In particular, if a company refused to pay, Twisted Spider issued press releases criticizing companies, and Viking Spider — which infected victims with Ragnar Locker — used Facebook ads and a "wall of shame." 

Concerns of criminal prosecution may have led to both the shutdown — or, more accurately, the renaming — of the Maze group as Egregor and the refutation that the groups were cooperating, the report stated.

"[T]he evidence ... supports the theory that Twisted Spider and other gangs do work together," the Analyst1 report states. "Both their retirement and backtracking on the Cartel affiliation after months of promoting it was likely an attempt to throw off researchers and law enforcement."

While the scant collaboration between the groups appears not to pose a threat, the groups are becoming more dangerous by reinvesting revenue into improving their ransomware operations. This includes expanding automated operations and regularly updating malware with more advanced features — both of which make the ransomware gangs more dangerous, says DiMaggio. 

Wizard Spider, the most experienced group and commonly associated with Trickbot and the Ryuk ransomware, has created an automated system for infecting and updating the victim organization's systems. While most ransomware attacks take several days or weeks from the initial compromise to "pull the trigger" and initiate the ransomware, automation could bring that down to hours, he says.

"In general, ransomware is currently a very manual process, but they are working diligently to close the time gap using automated techniques," he says.

The Lockbit Gang, the fourth member of the "cartel," invests a lot of time in automating its process. In one case, the attacker infected a system, extended the compromise, and executed the ransomware in less than two hours, according to the report. 

The gang pretends to be a support service, helping companies recover from the crypto-malware for a fee — that is, the ransom.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Threaded  |  Newest First  |  Oldest First
ryuuseika
ryuuseika,
User Rank: Apprentice
4/8/2021 | 7:39:49 AM
coalition
"Twisted Spider, Viking Spider, Wizard Spider and the Lockbit Gang" cartel or no cartel This is a false debate in my opinion.
The real question is:
when will there be a real international coalition to fight cybercrime?
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...