The Week in Ransomware – March 8th 2024 – Waiting for the DarkSide rebrand

The Week in Ransomware - March 8th 2024 - Waiting for the DarkSide rebrand

March 8, 2024 at 05:29PM

The BlackCat/ALPHV ransomware gang, after targeting critical infrastructure and stealing millions through an exit scam, has shut down. It caused widespread disruption, including $22M stolen from Optum’s Change Healthcare. Other ransomware attacks emerged, leading to concerns about the rise in cybercrime and discussions of a federal ban on ransom payments.

Based on the meeting notes, here are the key takeaways:

– The ALPHV/BlackCat ransomware gang shut down its servers after allegedly scamming an affiliate responsible for the $22 million attack on Optum.
– Concerns about the financial rewards from ransomware attacks continue to grow, prompting talks of a potential federal ban on ransom payments.
– Various new ransomware variants and their associated impact have been identified by PCrisk, including the STOP, SkyNet, Makop, and MedusaLocker variants.
– The BlackCat ransomware gang attempted an exit scam, claiming that the FBI seized their site and infrastructure.
– Talos observed collaboration between the GhostSec and Stormous ransomware groups in conducting double extortion attacks.
– Several significant ransomware attacks took place, including those targeting Duvel Moortgat Brewery and Capita, leading to production halts and IT outages, respectively.
– The FBI reported a substantial increase in reported losses from internet crimes, amounting to a record of $12.5 billion in 2023.
– The NCSC of Switzerland disclosed that a ransomware attack on Xplain led to the exposure of thousands of sensitive Federal government files.
– LockBit 3.0 mafia franchise’s claims of continued business operations following the Cronos legal operation were found to differ from reality.

Please let me know if you need further details or analysis on any specific points from the meeting notes.

Full Article