{"id":18210,"date":"2021-04-16T16:12:55","date_gmt":"2021-04-16T12:12:55","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/darkside-ransomware-industry\/18210\/"},"modified":"2021-04-16T16:13:32","modified_gmt":"2021-04-16T12:13:32","slug":"darkside-ransomware-industry","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/darkside-ransomware-industry\/18210\/","title":{"rendered":"Five signs ransomware is becoming an industry"},"content":{"rendered":"<p>Not content with its innovative <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-leverage\/39218\/\" target=\"_blank\" rel=\"noopener nofollow\">victim-pressuring tactics<\/a>, the DarkSide ransomware gang has forged ahead with DarkSide Leaks, a professional-looking website that could well be that of an online service provider, and is using traditional marketing techniques. What follows are the five most illustrative examples of one gang\u2019s transformation from an underground criminal group to an enterprise.<\/p>\n<h2>1. Media contacts<\/h2>\n<p>Legitimate companies always provide some sort of press center or media zone. The DarkSide cybercriminals have followed suit, publishing news about upcoming leaks and letting journalists ask questions in their press center.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161304\/darkside-ransomware-industry-press.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161304\/darkside-ransomware-industry-press.png\" alt=\"DarkSide Leaks press center\" width=\"448\" height=\"262\" class=\"aligncenter size-full wp-image-18211\"><\/a><\/p>\n<p>At least, that\u2019s what they say. In reality, DarkSide\u2019s aim is to generate as much online buzz as possible. More media attention could lead to more widespread fear of DarkSide, potentially meaning a greater chance the next victim will decide just to pay instead of causing trouble.<\/p>\n<h2>2. Decryption company partnerships<\/h2>\n<p>DarkSide\u2019s extortionists are seeking partners among companies that provide legitimate data decryption services. The ostensible reason is that some victims do not have their own infosec departments and have to rely on outside experts to decrypt their data. DarkSide offers such experts technical support and discounts linked to the amount of work they do.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161310\/darkside-ransomware-industry-partners.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161310\/darkside-ransomware-industry-partners.png\" alt=\"Partner search announcement\" width=\"624\" height=\"122\" class=\"aligncenter size-full wp-image-18213\"><\/a><\/p>\n<p>The subterfuge should be obvious, here. The crooks aren\u2019t looking out for victims who can\u2019t decrypt the data; they\u2019re looking for big money. State-owned companies may be prohibited from negotiating with extortionists, but they\u2019re free to work with companies that provide decryption services. The latter act as a kind of intermediary in this case, pretending to restore data but in fact simply paying the crooks and pocketing the change. That may be legal, but it smacks strongly of criminal collusion.<\/p>\n<h2>3. Charitable donations<\/h2>\n<p>The extortionists have been donating to charity, and they post about their donations on DarkSide Leaks. Why bother? Apparently, to persuade those reluctant to pay ransom that some of the money will go to a good cause.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161316\/darkside-ransomware-industry-charity.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161316\/darkside-ransomware-industry-charity.png\" alt=\"Charity\" width=\"624\" height=\"535\" class=\"aligncenter size-full wp-image-18215\"><\/a><\/p>\n<p>Here, we actually have another catch, in that some countries, including the US, prohibit charitable organizations <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-gang-donates-part-of-ransom-demands-to-charity-organizations\/\" target=\"_blank\" rel=\"nofollow noopener\">from taking money<\/a> obtained illegally. In other words, such payments would never actually reach them.<\/p>\n<h2>4. Business analytics<\/h2>\n<p>Originally, nobody but criminals and some infosec experts tended to see the stolen information ransomware operators posted, typically on hacker forums. Now, some cybercriminals have added data and market analysis, and they look for leverage in company contacts, clients, partners, and competitors before leaking stolen information. They can then send links to stolen files directly to interested parties. The main goal, <a href=\"https:\/\/www.kaspersky.com\/blog\/accellion-fta-data-leaks\/38980\/\" target=\"_blank\" rel=\"noopener nofollow\">again<\/a>, is to inflict maximum damage on the target so as to encourage payment and intimidate future victims.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161324\/darkside-ransomware-industry-letter.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161324\/darkside-ransomware-industry-letter.png\" alt=\"Letter to interested parties\" width=\"624\" height=\"143\" class=\"aligncenter size-full wp-image-18217\"><\/a><\/p>\n<h2>5. Declaration of moral principles<\/h2>\n<p>DarkSide Leaks contains an ethical principles declaration \u2014 just like the ones real corporations post on their websites. Here, cybercriminals make claims, for example saying they\u2019d never attack medical companies, funeral parlors, educational institutions, or nonprofit or government organizations. In this case, we are not sure what the goal of this declaration might be. Is the victim supposed to think, \u201cThese people care, so I\u2019ll definitely pay them\u201d?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161331\/darkside-ransomware-industry-principles.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/16161331\/darkside-ransomware-industry-principles.png\" alt=\"An ethical principles declaration\" width=\"624\" height=\"213\" class=\"aligncenter size-full wp-image-18219\"><\/a><\/p>\n<p>A recent <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-leverage\/39218\/\" target=\"_blank\" rel=\"noopener nofollow\">incident involving schoolkids\u2019 data<\/a> reveals the lie. Technically, that target wasn\u2019t an educational institution, but it was the school\u2019s data that the crooks threatened to publish.<\/p>\n<h2>What to do<\/h2>\n<p>Cybercriminals clearly have the resources to invest in market analysis, professional collaborations, and charity. The way to defeat them is to cut off their sources of income. That means:<\/p>\n<ul>\n<li>Don\u2019t pay ransom. It\u2019s a bold move that may have consequences, but not paying is the right option. See <a href=\"https:\/\/www.kaspersky.com\/blog\/to-pay-or-not-to-pay\/38946\/\" target=\"_blank\" rel=\"noopener nofollow\">Eugene Kaspersky\u2019s recent post<\/a> about why you should never give in;<\/li>\n<li>Install a <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> on all connected devices to cut off any ransomware schemes before they begin.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals\u2019 other PR tricks might be.<\/p>\n","protected":false},"author":2598,"featured_media":18221,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[433],"class_list":{"0":"post-18210","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-ransomware"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/darkside-ransomware-industry\/18210\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/darkside-ransomware-industry\/22728\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/darkside-ransomware-industry\/24563\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/darkside-ransomware-industry\/22591\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/darkside-ransomware-industry\/21661\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/darkside-ransomware-industry\/25072\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/darkside-ransomware-industry-2\/24409\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/darkside-ransomware-industry\/30524\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/darkside-ransomware-industry\/9535\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/darkside-ransomware-industry\/39377\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/darkside-ransomware-industry\/16786\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/darkside-ransomware-industry\/17323\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/darkside-ransomware-industry\/14689\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/darkside-ransomware-industry\/26522\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/darkside-ransomware-industry\/30492\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/darkside-ransomware-industry\/26915\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/darkside-ransomware-industry\/23761\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/darkside-ransomware-industry\/29102\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/darkside-ransomware-industry\/28901\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18210"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18210\/revisions"}],"predecessor-version":[{"id":18220,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18210\/revisions\/18220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18221"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}