DarkSide May Not Stay Dark For Long

There are few more serous forms of hacking than malware attacks designed to extort Ransom. Ransomware denies the computer owner the ability to make further use of the computer systems. In some cases, it has resulted in the loss of life because critical medical systems were attacked and could not be brought back live on time. One of the most potent Ransomware groups is known as  Darkside

DarkSide is believed to be based in Russia, but is not sponsored by the government there and they have previously claimed that its members are not allowed to mount attacks on targets in Russia, Ukraine, Georgia, or Belarus, suggesting some toleration of their criminal activity by these states. 

When US President Joe Biden met  Russian president Vladimir Putin at a summit in Switzerland this month, he called for mutual cooperation to end the ransom  exploits of Darkside and other Russian-based hackers, who are accused by the US Government of being responsible for both the Colonial Pipeline and the much larger SolarWinds attacks.

While DarkSide, was allegedly disbanded after carrying out the Colonial Pipeline ransomware attack, they may come back soon, using the same method under a different name, according to US intelligence sources

Research published recently by London-based blockchain analytics firm Elliptic appears to show that DarkSide extorted more than $90m in Bitcoin before supposedly halting its illegal activities. US cyber security experts have warned that 'certain countries' were turning a blind eye to the cyber criminal activity emanating from within their borders. 

Speaking to reprters, the acting Director of the National Counter Intelligence and Security Center Michael Orlando said: "We do know that countries like Russia and China, Iran and others certainly create safe havens for criminal hackers as long as they don’t conduct attacks against them."But that’s a challenge for us that we’re going to have to work through as we figure out how to counter ransomware attacks."

Assistant Attorney General of the Department of Justice’s National Security Division John Demers told CNBC that the Colonial Pipeline attack highlighted the issue of "nation-states serving as safe havens for criminal cyber-actors." Demers said that "nation-states aren’t doing their part to investigate and root out hacking activity happening within their borders." He went on to suggest that DarkSide, far from going dark, could be "just off renaming themselves.... Groups like that will come back.”

CNBC:     Elliptic:     TechRepublic:   Infosecurity Magazine:   The Cybersecurity:    Intellfence:   jioforme:  Image: Unsplash

You Might Also Read:

Russian Spy Chief Says SolarWinds Was An Inside Job:

 

« Remote Working & Cyber Security
Negotiating Ransom: To Pay Or Not? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

BugRaptors

BugRaptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.