'NetWalker' ransomware explodes thanks to 'as a service' expansion
The gang behind the malware has made $29m since March, according to McAfee
A ransomware group known as 'NetWalker' has been linked with a spate of attacks on businesses, after pivoting to a 'ransomware as a service' (RaaS) model, with the group offering its tools for sale over the dark web.
While the malware has been observed in various forms since August last year, it has become much more active following an aggressive pivot to a RaaS distribution model. The sudden uptick in attacks has helped the group amassed millions of dollars in ill-gotten gains in just over five months, according to McAfee Advanced Threat Research.
NetWalker is fairly new, having only been around for a year and remaining relativly quiet prior to 2020. The group behind it is similar to those behind Maze and REvil in that they threaten to publish victims' data if ransoms are not paid, McAfee said.
From the start of this year, the gang has been providing the tools and infrastructure for others to launch ransomware attacks in return for affiliate payments. These have been posted on dark market forums, inviting other criminals to become affiliates and help them spread the ransomware. The group reportedly has a preference for those with proven experience in cybercrime and existing access to corporate networks.
"NetWalker RaaS prioritises quality over quantity and is looking for people who are Russian-speaking and have experience with large networks," McAfee noted in its research. "People who already have a foothold in a potential victim's network and can exfiltrate data with ease are especially sought after. This is not surprising, considering that publishing a victims data is part of NetWalker's model."
Since the start of this year, NetWalker ransomware has been used on a number of different targets in western Europe and also the US, with the gang reportedly preferring larger organisations. In June, the University of California was attacked with NetWalker and was forced to negotiate a ransom over the dark web, thought to be $1,140,895. This also follows a similar attack on the University of Michigan.
Improving cyber security for remote working
13 recommendations to improve cybersecurity for remote workingDownload now
The latest victim of the NetWalker group is a threat detection startup called Cygilant, according to TechCrunch. Screenshots of the company's internal network files and directories reportedly appeared on a dark web site associated with the NetWalker group.
"Our Cyber Defense and Response Center team took immediate and decisive action to stop the progression of the attack," Christina Lattuca, Cygilant's chief financial officer said in a statement. "We are working closely with third-party forensic investigators and law enforcement to understand the full nature and impact of the attack. Cygilant is committed to the ongoing security of our network and to continuously strengthening all aspects of our security program."
Lattuca said that the company hadn't paid a ransom, but TechCrunch noted that the data had disappeared from the dark web - a development which sometimes indicates that the group has entered negotiations with its victim.
Four strategies for building a hybrid workplace that works
All indications are that the future of work is hybrid, if it's not here alreadyFree webinar
The digital marketer’s guide to contextual insights and trends
How to use contextual intelligence to uncover new insights and inform strategiesFree Download
Ransomware and Microsoft 365 for business
What you need to know about reducing ransomware riskFree Download
Building a modern strategy for analytics and machine learning success
Turning into business valueFree Download