{"id":23047,"date":"2022-02-23T08:06:49","date_gmt":"2022-02-23T13:06:49","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=23047"},"modified":"2022-02-23T08:06:49","modified_gmt":"2022-02-23T13:06:49","slug":"forget-the-dark-web-ransomware-gangs-weaponize-facebook-and-twitter-to-pressure-victims","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/forget-the-dark-web-ransomware-gangs-weaponize-facebook-and-twitter-to-pressure-victims\/","title":{"rendered":"Forget the Dark Web: Ransomware Gangs Weaponize Facebook and Twitter to Pressure Victims"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Forget the Dark Web: Ransomware Gangs Weaponize Facebook and Twitter to Pressure Victims<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><em>(Written by Jareth, for the Emsisoft blog. Republished with permission from Emsisoft)<\/em><\/span><\/p>\n<blockquote><p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The threat of public exposure is a core part of the ransomware playbook. The more eyeballs on an incident, the greater the embarrassment, reputational damage and risk of litigation for the victim \u2013 and the higher the chance of a payout for the ransomware gang responsible for the attack.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">But not every attack captures the attention of the public. With the news cycle already saturated with cyber attacks, it\u2019s all too easy for run of the mill incidents to get lost in the wash.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Now, in an effort to amplify coverage, some ransomware groups are using social media channels to bring news of their conquests to a wider audience and put more pressure on victims to pay the ransom.<\/span><\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Leak sites don\u2019t make for good publicity<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Double extortion has become the standard mode of operation among ransomware gangs. The premise is simple: after successfully exfiltrating data from a target company, a ransomware gang threatens to publish the stolen data unless the victim coughs up the ransom. In this way, threat actors can effectively extort victims twice: once, for the decryption of their scrambled data; and again, for the non-release of the stolen data.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Should a victim refuse to cough up the ransom, the stolen data is usually published on the ransomware gang\u2019s own platform. This typically takes the form of a Tor site, accessible only via the dark web and visited mostly by security researchers and other cybercriminals. As a means of quietly publishing repositories of stolen data, it\u2019s a good, functional solution. But in terms of broadcasting a message to a wide audience \u2013 the thing ransomware attackers need to elevate the profile of an attack and boost their chances of a payout \u2013 these leak sites are more back-alley soapboxes than bonafide news distribution channels.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In an attempt to bring news of their attacks to the masses, threat actors are now turning to mainstream social media platforms.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Twitter bots create fake buzz about Grief attack on the NRA <\/span><br \/>\n<span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In October 2021, The National Rifle Association of America (NRA) was hit with a strain of ransomware known as Grief, one of the many operations attributed to prolific Russian cybercrime group Evil Corp. Threat actors published on the Grief leak site 13 documents that had allegedly been stolen during the attack, including minutes from an NRA board meeting, grant applications and more.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Up until this point, the attack had followed a fairly standard sequence of events, as far as ransomware incidents go. However, shortly after Grief announced the details of the attack, some very unusual activity began to take place: all over Twitter, hundreds of accounts began sharing tweets about the attack.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">It was clear that the news frenzy wasn\u2019t organic. The accounts sharing the news had all been created in August and September 2021. Most didn\u2019t follow anyone, nor did they have any followers. The majority sported the default Twitter profile photo, while the ones that did have pictures appeared to have been taken from Russian dating sites like Tralolo and Shuri-Muri. All of the accounts were intent on promoting content related to attacks perpetrated by Grief.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">This wasn\u2019t the next random viral sensation. This was an orchestrated information operation intended to amplify coverage and elevate a fairly unremarkable attack to headline-worthy status in order to pressure the NRA into paying. It\u2019s likely that Grief was involved with the Twitter campaign, although it remains unclear if Grief owned and operated the Twitter troll network or worked with a third party.<\/span><\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Ragnar Locker uses Facebook ads to promote attack<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The Grief Twitter campaign wasn\u2019t the first time threat actors have used social media to increase public awareness of an attack.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In early November 2020, Italian beverage vendor Campari Group experienced significant disruption when its systems were infected with ransomware. A few days later, the company acknowledged the attack in a statement that said \u201cAt this stage, we cannot completely exclude that some personal and business data has been taken.\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">On 9 November 2020, advertisements began popping up on Facebook that were evidently designed to publicly pressure the Campari Group into paying the ransom. The ad asserted that Campari Group\u2019s statement was \u201cridiculous and looks like a big fat lie \u2026 we can confirm that confidential data was stolen and we talking about huge volume of data.\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The ad claimed that prolific cybercrime group Rangar Locker had exfiltrated two terabytes of information and gave Campari Group until 6 p.m. EST to negotiate payment in exchange for the non-release of the stolen data.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">As KrebsOnSecurity discovered, the ads had been funded by Hodson Event Entertainment, an account owned by a Chicago-based DJ whose Facebook account had been hacked. The attackers budgeted $500 for the campaign and reached around 7,150 users before Facebook disabled the ad campaign.<\/span><\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Other groups weaponize Twitter and Tumblr<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Not every ransomware group goes to the effort of using Twitter bots and paid ads to promote an attack. Plenty of threat actors, including DoppelPaymer, 54bb47h and Marketo are weaponizing social media in a more straightforward way, using Twitter as a distribution channel to promote their attacks to a mainstream audience. A group known as RobinHood recently started a Tumblr account, where it apparently plans to post the names of its victims and screenshots of pilfered data.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Sometimes, ransomware groups also reach out directly to members of the press via social media, hoping that a journalist will pick up the story and bring more attention to an incident.<\/span><\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Takeaway<br \/>\n<\/span><\/strong><br \/>\n<span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">It\u2019s easy for ransomware victims to be lethargic when a data leak is confined to an obscure Tor website that the average Joe will never see. It\u2019s a different story when that same stolen sensitive data is being publicly discussed and shared on mainstream social media platforms.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Posting sensitive stolen data is, of course, against the terms and conditions of every social media platform. But social media firms aren\u2019t always as quick to deal with reports of abuse as they should be, which enables threat actors to abuse their platforms more effectively.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">We may see more threat actors venturing out from the dark web and leveraging social channels as they continue to find creative ways to pressure their victims into paying.<\/span><\/p><\/blockquote>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">We use and recommend Emsisoft Antimalware. <span style=\"text-decoration: underline;\"><a href=\"https:\/\/thundercloud.net\/emsisoft\/\" target=\"_blank\" rel=\"noopener\">Learn more here<\/a><\/span><\/span><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Forget the Dark Web: Ransomware Gangs Weaponize Facebook and Twitter to Pressure Victims (Written by Jareth, for the Emsisoft blog. Republished with permission from Emsisoft) The threat of public exposure is a core part of the ransomware playbook. The more eyeballs on an incident, the greater the embarrassment, reputational damage and risk of litigation for the\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/forget-the-dark-web-ransomware-gangs-weaponize-facebook-and-twitter-to-pressure-victims\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1669,1682,2270],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23047"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=23047"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23047\/revisions"}],"predecessor-version":[{"id":23048,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/23047\/revisions\/23048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=23047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=23047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=23047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}