Government exposes ransomware gang and threatens action, announces task force and mulls making payment of ransoms to ransomware gangs illegal
November 13, 2022
There are two particular frustrations working in the cybersecurity sphere and writing on it; reading about “developments” that have been known about for years and the kabuki, theater, that governments and agencies engage in, such as claiming to hunt down hackers, which detracts from the more relevant but mundane action, getting organisations and governments to develop and maintain proper data security. The vast majority of data breaches can be linked to some form of human error or another.
Both are present in the response to the Medibank data breach.
The Government announced that it had uncovered the name of the cybhackers. That group has been identified as REvil, a group that operates in the Russian Federation with full but deniable knowledge of its government. This is hardly a banner moment in Australian cyber security and law enforcement. Ransomware gangs are often identified and usually within short order. They have their own techniques and have distinctive malware. Much like many criminal gangs their modus operandi is distinctive. REvil is so well known that it has its own wikipedia page. Like many criminal hacker gangs operating in the Russian Federation it operates in a grey area; unofficially tolerated and occasionally used by state authorities in exchange for being left alone. Cyber criminals also operate out of China and the Stans.
The Government has put together a task force to hack the hackers. The Australian Federal Police and the Australian Signals Directorate are combining to identify the hackers and their associates and bring them to justice. While that is an appropriate response a dose of realism needs to be injected into the story lest hopes are raised too high. Cyber hackers are usually phycially beyond reach of Australian authorities and unlikely to be subject to successful extradition applications. The Australian Federal Police is engaging with its Russian counterparts about the cyber crimninals. That is unlikely to go anywhere. Engaging in cyber warfare with hackers is difficult. Hackers change tactics. For example Ransomware gangs are increasingly using their own or stolen computer code and moving away from a leasing model that made their activities easier to monitor. Until recently hackers leased their malicious software and computing infrastructure to others in what is known as ransomware-as-a-service. That was used by gangs such as such as Conti, which shuttered Irish health systems, and REvil. Senator Paterson has called for hackers to be sanctioned. It is another form of political theater. Magnitsky sanctions are meaningless when dealing with hackers. If proceeds of crimecan be located, and they are in a country which has apolitical police force and independent judiciary, such as Canada, the USA and most European states, they can be seized without the need for Magnitsky sanctions.
The payment of a ransom is not illegal. The government is considering making such payments illegal. Discouraging the payment of ransom is one thing. Criminalising it is another. Sometimes it is the only practical solution in the time available so criminalising the conduct puts a business into a terrible bind. It is a crime that may be difficult to detect but also used by hackers to further extort those who have paid ransoms.
That is not to say that successful action can’t be taken. A Russian national linked to the LockBit ransomware gang was arrested in Ontario in October. What needs to be remembered is that ransomware is an international problem as Bleeping Computer makes clear in The Week in Ransomware – November 11th 2022 – LockBit feeling the heat. It relevantly provides:
The big news is the arrest of a Russian LockBit member in Canada, who is said to be responsible for making ransom demands between €5 to €70 million.
Over the past few weeks, a threat actor has been trolling victims by distributing the Azov Ransomware and blaming its creation on cybersecurity researchers and journalists. Read the rest of this entry »