- People on Twitter ask whose ancestors would’ve passed immigrant ‘wealth test’ Monday 6:54 PM
- Kobe Bryant helicopter crash mocked in teen’s TikTok video Monday 6:38 PM
- Chiefs, Bears, Packers have Twitter accounts hacked Monday 3:48 PM
- Washington Post reporter suspended amid backlash over Kobe Bryant tweet Monday 3:08 PM
- America is united in hating Ken Starr’s impeachment hat Monday 3:01 PM
- In ‘Cuties,’ the contradictions of growing up come to a head Monday 1:55 PM
- Racist tweets blame fruit bat soup for coronavirus Monday 1:25 PM
- What is the #ILeftTheGOP movement? Monday 1:21 PM
- The Grammys were weird and sad—but the Billy Porter hat memes offered some levity Monday 12:36 PM
- Auschwitz Museum calls on Facebook to ban Holocaust denialism Monday 11:59 AM
- YouTuber who said his girlfriend was dead now says he faked it Monday 11:42 AM
- Review: Kentucky Route Zero is one of the most magical games ever made Monday 11:00 AM
- Backlash grows against Clearview as lawsuit looms Monday 10:58 AM
- Tyler the Creator calls out the Grammys for racism over ‘Rap Album’ win Monday 10:25 AM
- Democrats call on John Bolton to testify after book bombshell Monday 9:56 AM
Cybersecurity experts are warning of an uptick in ransomware attacks after a campaign against large enterprises netted hackers more than $3 million.
According to two leading cybersecurity firms, CrowdStrike and FireEye, a strain of ransomware known as Ryuk has been used to elicit over $3.7 million in cryptocurrency payments since August of last year.
CrowdStrike has attributed the attacks to the cybercrime cell “GRIM SPIDER,” a part of the larger “WIZARD SPIDER” criminal enterprise group suspected of operating out of Russia.
Media reports initially placed the blame on North Korean government hackers after Ryuk ransomware was used in December of last year to cripple Tribune Publishing, a company which prints newspapers for major outlets such as the Chicago Tribune.
Many of GRIM SPIDER’s victims, CrowdStrike notes, were found to have TrickBot malware on their computers as well, used prior to the deployment of Ryuk.
The attacks are believed to have been started primarily by a large spam email campaign. The hackers then carried out reconnaissance against their victims in order to locate computers at large companies.
After finding a high-value target, the Ryuk ransomware is used to lock victims’ computers before demanding a large sum of money in exchange for the return of their files.
“Since Ryuk’s appearance in August, the threat actors operating it have netted over 705.80 BTC across 52 transactions for a total current value of $3,701,893.98 USD,” CrowdStrike writes.
FireEye adds that “a notable uptick in the latter half of 2018” has proven lucrative for the hackers.
“FireEye Intelligence expects that these operations will continue to gain traction throughout 2019 due the success these intrusion operators have had in extorting large sums from victim organizations,” the company states.
CrowdStrike characterizes such attacks as “big game hunting,” in which a few highly-profitable organizations are targeted instead of many individual internet users.
- A man found a camera in his Airbnb and the company didn’t seem to care
- Sprint promises to stop selling location data after outcry
- New Nike shoes can be controlled from your smartphone
H/T Digital Trends
Mikael Thalen is a tech and security reporter based in Seattle, covering social media, data breaches, hackers, and more.