IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

'NetWalker' ransomware explodes thanks to 'as a service' expansion

The gang behind the malware has made $29m since March, according to McAfee

A ransomware group known as 'NetWalker' has been linked with a spate of attacks on businesses, after pivoting to a 'ransomware as a service' (RaaS) model, with the group offering its tools for sale over the dark web. 

While the malware has been observed in various forms since August last year, it has become much more active following an aggressive pivot to a RaaS distribution model. The sudden uptick in attacks has helped the group amassed millions of dollars in ill-gotten gains in just over five months, according to McAfee Advanced Threat Research.

NetWalker is fairly new, having only been around for a year and remaining relativly quiet prior to 2020. The group behind it is similar to those behind Maze and REvil in that they threaten to publish victims' data if ransoms are not paid, McAfee said.

From the start of this year, the gang has been providing the tools and infrastructure for others to launch ransomware attacks in return for affiliate payments. These have been posted on dark market forums, inviting other criminals to become affiliates and help them spread the ransomware. The group reportedly has a preference for those with proven experience in cybercrime and existing access to corporate networks.

"NetWalker RaaS prioritises quality over quantity and is looking for people who are Russian-speaking and have experience with large networks," McAfee noted in its research. "People who already have a foothold in a potential victim's network and can exfiltrate data with ease are especially sought after. This is not surprising, considering that publishing a victims data is part of NetWalker's model."

Since the start of this year, NetWalker ransomware has been used on a number of different targets in western Europe and also the US, with the gang reportedly preferring larger organisations. In June, the University of California was attacked with NetWalker and was forced to negotiate a ransom over the dark web, thought to be $1,140,895. This also follows a similar attack on the University of Michigan.  

Related Resource

Improving cyber security for remote working

13 recommendations to improve cybersecurity for remote working

Download now

The latest victim of the NetWalker group is a threat detection startup called Cygilant, according to TechCrunch. Screenshots of the company's internal network files and directories reportedly appeared on a dark web site associated with the NetWalker group. 

"Our Cyber Defense and Response Center team took immediate and decisive action to stop the progression of the attack," Christina Lattuca, Cygilant's chief financial officer said in a statement. "We are working closely with third-party forensic investigators and law enforcement to understand the full nature and impact of the attack. Cygilant is committed to the ongoing security of our network and to continuously strengthening all aspects of our security program."

Lattuca said that the company hadn't paid a ransom, but TechCrunch noted that the data had disappeared from the dark web - a development which sometimes indicates that the group has entered negotiations with its victim. 

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT
ransomware

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
RATDispenser evades nine in ten anti-virus engines
Security

RATDispenser evades nine in ten anti-virus engines

24 Nov 2021
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

19 Nov 2021

Most Popular

Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
Costa Rica declares state of emergency following Conti ransomware attack
ransomware

Costa Rica declares state of emergency following Conti ransomware attack

10 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022