{"id":15350,"date":"2020-02-06T19:22:54","date_gmt":"2020-02-07T00:22:54","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-data-disclosure\/15350\/"},"modified":"2020-09-02T21:33:15","modified_gmt":"2020-09-02T17:33:15","slug":"ransomware-data-disclosure","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-data-disclosure\/15350\/","title":{"rendered":"Backing up is no panacea when blackmailers publish stolen data"},"content":{"rendered":"<p>Backing up data has been one of the most effective, though labor-intensive, safeguards against encrypting ransomware so far. Now, malefactors seem to have caught up with those who rely on backups. The creators of several ransomware programs, confronted with victims refusing to pay the ransom, shared their data online.<\/p>\n<h2>Data publication makes threats into reality<\/h2>\n<p>Threats to make confidential information public are nothing new. For example, in 2016, the group behind the cryptoware that <a href=\"https:\/\/www.theverge.com\/2016\/11\/28\/13769360\/muni-hacker-threat-release-customer-data-san-francisco\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">infected the San Francisco Municipal Railway<\/a>\u2018s systems tried that trick. They never followed through on their threat, though.<\/p>\n<h3>Maze was the first<\/h3>\n<p>Unlike its predecessors, the group behind Maze ransomware delivered on its promises in late 2019 \u2014 more than once. In November, when Allied Universal refused to pay up, the criminals <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/allied-universal-breached-by-maze-ransomware-stolen-data-leaked\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">leaked 700MB of internal data online<\/a> including contracts, termination agreements, digital certificates, and more. The blackmailers said they had published just 10% of what they had stolen and threatened to make the rest available publicly if the target did not cooperate.<\/p>\n<p>In December, Maze actors <a href=\"https:\/\/krebsonsecurity.com\/2019\/12\/ransomware-gangs-now-outing-victim-businesses-that-dont-pay-up\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">created a website<\/a> and used it to post the names of victimized companies, infection dates, amount of data stolen, and IP addresses and names of infected servers. They uploaded some documents as well. At the end of that month, 2GB of files, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-releases-files-stolen-from-city-of-pensacola\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">apparently stolen from the city of Pensacola<\/a>, Florida, appeared online. The blackmailers said they published the information to prove they weren\u2019t bluffing.<\/p>\n<p>In January, the creators of Maze <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-not-getting-paid-leaks-data-left-and-right\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">uploaded<\/a> 9.5GB of Medical Diagnostic Laboratories data and 14.1GB of documents from cable maker Southwire, which had earlier sued the blackmailers for leaking confidential information. The lawsuit made the Maze website shut down, but that will not last.<\/p>\n<h3>Next came Sodinokibi, Nemty, BitPyLock<\/h3>\n<p>Other cybercriminals followed. The group behind the ransomware Sodinokibi, which was used to attack international financial company Travelex on New Year\u2019s Eve, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sodinokibi-ransomware-says-travelex-will-pay-one-way-or-another\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">stated its intention in early January to publish data belonging to the company\u2019s customers<\/a>. The cybercriminals say they have more than 5GB of information including birth dates, social security numbers, and bank card details.<\/p>\n<p>For Travelex\u2019s part, the company says it\u2019s seen no evidence of a leak, and that it refuses to pay. Meanwhile, the offenders say the company has agreed to enter negotiations.<\/p>\n<p>On January 11th, the same group <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sodinokibi-ransomware-publishes-stolen-data-for-the-first-time\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">uploaded<\/a> links to about 337MB of data to a hacker message board, saying the data belonged to recruiting company Artech Information Systems, which refused to pay the ransom. The offenders said the uploaded data represented only a fraction of what they had stolen. They said they intended to sell, not publish, the rest unless the victims complied.<\/p>\n<p>The authors of Nemty malware were next to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nemty-ransomware-to-start-leaking-non-paying-victims-data\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">announce<\/a> plans to publish nonpayers\u2019 confidential data. They said they intended to create a blog for posting piece by piece the internal documents of victims who won\u2019t fulfill their demands.<\/p>\n<p>The operators of BitPyLock ransomware <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bitpylock-ransomware-now-threatens-to-publish-stolen-data\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">joined the trend<\/a> by adding to their ransom note a promise that they would make their victim\u2019s confidential data available publicly. Although they have yet to do so, BitPyLock may well prove to be stealing data as well.<\/p>\n<h2>No mere ransomware<\/h2>\n<p>Advanced features added to ransomware programs are nothing new. For example, back in 2016, a version of the Shade Trojan <a href=\"https:\/\/securelist.com\/shade-not-by-encryption-alone\/75645\/\" target=\"_blank\" rel=\"noopener noreferrer\">installed remote administration tools<\/a> instead of encrypting files if it found that it had hit an accounting machine. CryptXXX both encrypted files and <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptxxx-ransomware\/11939\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">stole Bitcoin and victims\u2019 logins<\/a>. The group behind RAA <a href=\"https:\/\/securelist.com\/a-malicious-pairing-of-cryptor-and-stealer\/76039\/\" target=\"_blank\" rel=\"noopener noreferrer\">equipped some specimens of the malware with the Pony Trojan<\/a>, which targeted logins as well.\u00a0 Ransomware\u2019s ability to steal data should surprise no one \u2014 especially now that companies are increasingly recognizing the need to back up their information.<\/p>\n<p>It is worrisome that there is no safeguarding oneself against these attacks with backups. If you are infected, there is no way for you to avoid losses, which will not necessarily be limited to ransom; blackmailers provide no guarantees. The only way to protect yourself is not to let malware into your systems.<\/p>\n<h2>How to protect yourself from ransomware<\/h2>\n<p>Whether this new ransomware trend will prove effective or be abandoned remains to be seen. These attacks are only starting to gain momentum, so you need to stay protected. That means more than just avoiding reputational losses and disclosure of trade secrets \u2014 if you let a client\u2019s personal data get stolen, you may face serious fines. So, here is some advice:<\/p>\n<ul>\n<li>Improve information security awareness. The more knowledgeable staffers are, the lower the probability that phishing and other social engineering techniques will work on them. We have a learning platform, <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>, designed for employees with varying workload levels, interests, and level of access to confidential information.<\/li>\n<li>Update your operating systems and software promptly \u2014 especially anything found to contain vulnerabilities that allow unauthorized access to and control of the system.<\/li>\n<li>Use a specialized protective solution aimed at combating ransomware. For example, you can download our<br>\n<a href=\"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=me-en_KB_nv0092&amp;utm_content=link&amp;utm_term=me-en_kdaily_organic_1drobvqxak929hs\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Ransomware Tool<\/a> free of charge.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.<\/p>\n","protected":false},"author":2509,"featured_media":15351,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[2228,1201,1183,2229,2230,433,2175],"class_list":{"0":"post-15350","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-anti-ransomware","10":"tag-cryptors","11":"tag-leaks","12":"tag-maze","13":"tag-nemty","14":"tag-ransomware","15":"tag-sodin"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-data-disclosure\/15350\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-data-disclosure\/18474\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-data-disclosure\/7477\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-data-disclosure\/20241\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-data-disclosure\/18567\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-data-disclosure\/17077\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-data-disclosure\/21070\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-data-disclosure\/19904\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-data-disclosure\/26264\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-data-disclosure\/7655\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-data-disclosure\/32410\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-data-disclosure\/13705\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-data-disclosure\/14014\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-data-disclosure\/12753\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-data-disclosure\/22136\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/ransomware-data-disclosure\/10751\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-data-disclosure\/26862\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-data-disclosure\/24954\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-data-disclosure\/20914\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-data-disclosure\/25755\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-data-disclosure\/25587\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2509"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15350"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15350\/revisions"}],"predecessor-version":[{"id":16403,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15350\/revisions\/16403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15351"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}