The FBI and international partners have at least temporarily  disrupted the network of a prolific ransomware gang they infiltrated  last year, saving victims including hospitals and school districts a  potential $130 million in ransom payments.
   “Simply put, using  lawful means we hacked the hackers,” U.S. Deputy Attorney General Lisa  Monaco said at a news conference attended by Attorney General Merrick  Garland and other U.S. officials Thursday.
                  Officials said the targeted syndicate, known as Hive, is among  the world’s top five ransomware networks and has heavily targeted  health care. 
   The FBI quietly accessed its control panel in July  and was able to obtain software keys it used with German and other  partners to decrypt networks of some 1,300 victims globally, said FBI  Director Christopher Wray.
   How the takedown will affect Hive’s  long-term operations is unclear. Officials announced no arrests but  said, to pursue prosecutions, they were building a map of the  administrators who manage the software and the affiliates who infect  targets and negotiate with victims.
   “I think anyone involved with Hive should be concerned because this investigation is ongoing,” Wray said.
   On  Wednesday night, FBI agents seized computer servers in Los Angeles used  to support the network. Two Hive dark web sites were seized: one used  for leaking data of non-paying victims, the other for negotiating  extortion payments.
   “Cybercrime is a constantly evolving threat,  but as I have said before, the Justice Department will spare no resource  to bring to justice anyone anywhere that targets the United States with  a ransomware attack,” Garland said.
   He said the infiltration,  led by the FBI’s Tampa office, allowed agents in one instance to disrupt  a Hive attack against a Texas school district, stopping it from making a  $5 million payment.
   It’s a big win for the U.S. Justice  Department. Ransomware is the world’s biggest cybercrime headache with  everything from Britain’s postal service and Ireland’s national health  network to Costa Rica’s government crippled by Russian-speaking  syndicates that enjoy Kremlin protection.
   The  criminals lock up, or encrypt, victims’ networks, steal sensitive data  and demand large sums. Their extortion has evolved to where data is  pilfered before ransomware is activated, then effectively held hostage.  Pay up in cryptocurrency or it is released publicly.
   As an  example of a Hive sting, Garland said it kept one Midwestern hospital in  2021 from accepting new patients at the height of the COVID-19  epidemic.
   The online takedown notice, alternating in English and  Russian, mentions Europol and German law enforcement partners. The  German news agency dpa quoted prosecutors in Stuttgart as saying cyber  specialists in the southwestern town of Esslingen were decisive in  penetrating Hive’s criminal IT infrastructure after a local company was  victimized.
   In a statement, Europol said companies in more than  80 countries, including oil multinationals, have been compromised by  Hive and that law enforcement from 13 countries was in on the  infiltration.
   A U.S. government advisory last year said Hive  ransomware actors victimized over 1,300 companies worldwide from June  2021 through November 2022, netting about $100 million in payments.  Criminals using Hive’s ransomware-as-a-service tools targeted a wide  range of businesses and critical infrastructure, including government,  manufacturing and especially health care.
   Though the FBI offered  decryption keys to some 1,300 victims globally, Wray said only about 20%  reported potential issues to law enforcement.
   “Here,  fortunately, we were still able to identify and help many victims who  didn’t report. But that is not always the case,” Wray said. “When  victims report attacks to us, we can help them and others, too.”
   Victims  sometimes quietly pay ransoms without notifying authorities — even if  they’ve quickly restored networks — because the data stolen from them  could be extremely damaging to them if leaked online. Identity theft is  among the risks.
   marketwatch.com |