financetom
Technology
financetom
/
Technology
/
How the Kremlin provides a safe harbor for ransomware
News World Market Environment Technology Personal Finance Politics Retail Business Economy Cryptocurrency Forex Stocks Market Commodities
How the Kremlin provides a safe harbor for ransomware
Apr 16, 2021 6:04 AM

A global epidemic of digital extortion known as ransomware is crippling local governments, hospitals, school districts and businesses by scrambling their data files until they pay up. Law enforcement has been largely powerless to stop it.

One big reason: Ransomware rackets are dominated by Russian-speaking cybercriminals who are shielded and sometimes employed by Russian intelligence agencies, according to security researchers, US law enforcement, and now the Biden administration.

On Thursday, as the US slapped sanctions on Russia for malign activities including state-backed hacking, the Treasury Department said Russian intelligence has enabled ransomware attacks by cultivating and co-opting criminal hackers and giving them safe harbor. With ransomware damages now well into the tens of billions of dollars, former British intelligence cyber chief Marcus Willett recently deemed the scourge arguably more strategically damaging than state cyber-spying.

The value of Kremlin protection isnt lost on the cybercriminals themselves. Earlier this year, a Russian-language dark-web forum lit up with criticism of a ransomware purveyor known only as Bugatti, whose gang had been caught in a rare US-Europol sting. The assembled posters accused him of inviting the crackdown with technical sloppiness and by recruiting non-Russian affiliates who might be snitches or undercover cops.

Worst of all, in the view of one long-active forum member, Bugatti had allowed Western authorities to seize ransomware servers that could have been sheltered in Russia instead. Mother Russia will help, that individual wrote. Love your country and nothing will happen to you. The conversation was captured by the security firm Advanced Intelligence, which shared it with the Associated Press.

Like almost any major industry in Russia, (cybercriminals) work kind of with the tacit consent and sometimes explicit consent of the security services, said Michael van Landingham, a former CIA analyst who runs the consultancy Active Measures LLC.

Russian authorities have a simple rule, said Karen Kazaryan, CEO of the software industry-supported Internet Research Institute in Moscow: Just don't ever work against your country and businesses in this country. If you steal something from Americans, that's fine.

Unlike North Korea, there is no indication Russian government benefits directly from ransomware crime, although Russian President Vladimir Putin may consider the resulting havoc a strategic bonus.

In the US alone last year, ransomware struck more than a hundred federal, state, and municipal agencies, upward of 500 hospitals and other health care centers, some 1,680 schools, colleges and universities, and hundreds of businesses, according to the cybersecurity firm Emsisoft.

Damage in the public sector alone is measured in rerouted ambulances, postponed cancer treatments, interrupted municipal bill collection, canceled classes and rising insurance costs all during the worst public health crisis in more than a century.

The idea behind these attacks is simple: Criminals infiltrate malicious data-scrambling software into computer networks, use it to kidnap an organizations data files, then demand huge payments, now as high as USD 50 million, to restore them. The latest twist: if victims fail to pay up, the criminals may publish their unscrambled data on the open internet.

In recent months, US law enforcement has worked with partners including Ukraine and Bulgaria to bust up these networks. But with the criminal masterminds out of reach, such operations are generally little more than whac-a-mole.

Collusion between criminals and the government is nothing new in Russia, said Adam Hickey, a US deputy assistant attorney general, who noted that cybercrime can provide good cover for espionage.

Back in the 1990s, Russian intelligence frequently recruited hackers for that purpose, said Kazaryan. Now, he said, ransomware criminals are just as likely to be moonlighting state-employed hackers.

The Kremlin sometimes enlists arrested criminal hackers by offering them a choice between prison and working for the state, said Dmitri Alperovitch, former chief technical officer of the cybersecurity firm Crowdstrike. Sometimes the hackers use the same computer systems for state-sanctioned hacking and off-the-clock cybercrime for personal enrichment, he said. They may even mix state with personal business.

That's what happened in a 2014 hack of Yahoo that compromised more than 500 million user accounts, allegedly including those of Russian journalists and US and Russian government officials. A US investigation led to the 2017 indictment of four men, including two officers of Russia's FSB security service a successor to the KGB. One of them, Dmitry Dokuchaev, worked in the same FSB office that cooperates with the FBI on computer crime. Another defendant, Alexsey Belan, allegedly used the hack for personal gain.

A Russian Embassy spokesman declined to address questions about his government's alleged ties to ransomware criminals and state employees' alleged involvement in cybercrime. We do not comment on any indictments or rumors, said Anton Azizov, the deputy press attache in Washington.

Proving links between the Russian state and ransomware gangs is not easy. The criminals hide behind pseudonyms and periodically change the names of their malware strains to confuse Western law enforcement.

But at least one ransomware purveyor has been linked to the Kremlin. Maksim Yakubets, 33, is best known as co-leader of a cybergang that cockily calls itself Evil Corp. The Ukraine-born Yakubets lives a flashy lifestyle, He drives a customized Lamborghini supercar with a personalized number plate that translates to Thief, according to Britains National Crime Agency.

Yakubets started working for the FSB in 2017, tasked with projects including acquiring confidential documents through cyber-enabled means and conducting cyber-enabled operations on its behalf, according to a December 2019 U.S. indictment. At the same time, the US Treasury Department slapped sanctions on Yakubets and offered a USD 5 million reward for information leading to his capture. It said he was known to have been in the process of obtaining a license to work with Russian classified information from the FSB.

The indictment charged Evil Corp. with developing and distributing ransomware used to steal at least USD 100 million in more than 40 countries over the previous decade, including payrolls pilfered from towns in the American heartland.

By the time Yakubets was indicted, Evil Corp. had become a major ransomware player, security researchers say. By May 2020, the gang was distributing a ransomware strain that was used to attack eight Fortune 500 companies, including the GPS device maker Garmin, whose network was offline for days after an attack, according to Advanced Intelligence.

Yakubets remains at large. Another Russian currently imprisoned in France, however, might offer more insight into the dealings of cybercriminals and the Russian state. Alexander Vinnick was convicted of laundering $160 million in criminal proceeds through a cryptocurrency exchange called BTC-e. A 2017 U.S. indictment charged that some of the largest known purveyors of ransomware actually used it to launder USD 4 billion. But Vinnick can't be extradited until he completes his 5-year French prison sentence in 2024.

Still, a 2018 study by the nonpartisan think tank Third Way found the odds of successfully prosecuting authors of cyberattacks against US targets ransomware and online bank theft are the costliest are no better than three in a thousand. Experts say that those odds have gotten longer.

This week's sanctions send a strong message, but aren’t likely to deter Putin unless the financial sting hits closer to home, many analysts believe.

That might require the kind of massive multinational coordination that followed the 9/11 terror attacks. For instance, allied countries could identify banking institutions known to launder ransomware proceeds and cut them off from the global financial community.

If you're able to follow the money and disrupt the money and take the economic incentive out, that'll go a long way in stopping ransomware attacks, said John Riggi, cybersecurity advisor for the American Hospital Association and a former FBI official.

First Published:Apr 16, 2021 3:04 PM IST

Comments
Welcome to financetom comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
Related Articles >
Xiaomi reports 27% rise in Q1 revenue on strong smartphone sales
Xiaomi reports 27% rise in Q1 revenue on strong smartphone sales
May 23, 2024
BEIJING (Reuters) - Chinese electronics maker Xiaomi ( XIACF ) posted a bigger-than-expected 27% rise in first-quarter revenue on Thursday, boosted by strong sales of handsets amid a recovery in the smartphone market. For the first three months of this year, Xiaomi's ( XIACF ) revenue was 75.5 billion yuan ($10.42 billion), compared with the 73.3 billion yuan estimated by...
Former Wipro CEO Delaporte earned $20 mln in last year at helm
Former Wipro CEO Delaporte earned $20 mln in last year at helm
May 23, 2024
BENGALURU, May 23 (Reuters) - India's No.4 IT services firm Wipro paid $20.1 million in annual compensation to former CEO Thierry Delaporte who resigned in April, well before his five-year term was set to end in July 2025. The Frenchman's compensation included $3.9 million in salary and allowances, about $5.1 million in variable pay, the cost of accelerated vesting of...
US plans $75 million grant to Absolics for advanced chip packaging
US plans $75 million grant to Absolics for advanced chip packaging
May 23, 2024
WASHINGTON (Reuters) - The US Commerce Department said on Thursday it plans to grant $75 million to Absolics for constructing a 120,000-square-foot facility in Georgia that will supply advanced materials to the country's semiconductor industry. The planned award to the semiconductor packaging provider, an affliate of SKC Co, which in turn is part of South Korea's second-largest conglomerate SK Group,...
Audrey Tang: Learning From Taiwan’s Digital Civic Experimentation
Audrey Tang: Learning From Taiwan’s Digital Civic Experimentation
May 23, 2024
A new political philosophy has entered the chat. “Plurality,” the title and central subject of a new book by Microsoft’s internal economist Glen Weyl and Taiwan’s former (as of yesterday) Minister of Digital Affairs Audrey Tang, is the idea that collaboration-enhancing technologies should be more widely embraced both by the public and state. Societies should learn to cherish a wider...
Copyright 2023-2025 - www.financetom.com All Rights Reserved