'NetWalker' ransomware explodes thanks to 'as a service' expansion
The gang behind the malware has made $29m since March, according to McAfee
A ransomware group known as 'NetWalker' has been linked with a spate of attacks on businesses, after pivoting to a 'ransomware as a service' (RaaS) model, with the group offering its tools for sale over the dark web.
While the malware has been observed in various forms since August last year, it has become much more active following an aggressive pivot to a RaaS distribution model. The sudden uptick in attacks has helped the group amassed millions of dollars in ill-gotten gains in just over five months, according to McAfee Advanced Threat Research.
NetWalker is fairly new, having only been around for a year and remaining relativly quiet prior to 2020. The group behind it is similar to those behind Maze and REvil in that they threaten to publish victims' data if ransoms are not paid, McAfee said.
From the start of this year, the gang has been providing the tools and infrastructure for others to launch ransomware attacks in return for affiliate payments. These have been posted on dark market forums, inviting other criminals to become affiliates and help them spread the ransomware. The group reportedly has a preference for those with proven experience in cybercrime and existing access to corporate networks.
"NetWalker RaaS prioritises quality over quantity and is looking for people who are Russian-speaking and have experience with large networks," McAfee noted in its research. "People who already have a foothold in a potential victim's network and can exfiltrate data with ease are especially sought after. This is not surprising, considering that publishing a victims data is part of NetWalker's model."
Since the start of this year, NetWalker ransomware has been used on a number of different targets in western Europe and also the US, with the gang reportedly preferring larger organisations. In June, the University of California was attacked with NetWalker and was forced to negotiate a ransom over the dark web, thought to be $1,140,895. This also follows a similar attack on the University of Michigan.
RELATED RESOURCE
Improving cyber security for remote working
13 recommendations to improve cybersecurity for remote working
The latest victim of the NetWalker group is a threat detection startup called Cygilant, according to TechCrunch. Screenshots of the company's internal network files and directories reportedly appeared on a dark web site associated with the NetWalker group.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Our Cyber Defense and Response Center team took immediate and decisive action to stop the progression of the attack," Christina Lattuca, Cygilant's chief financial officer said in a statement. "We are working closely with third-party forensic investigators and law enforcement to understand the full nature and impact of the attack. Cygilant is committed to the ongoing security of our network and to continuously strengthening all aspects of our security program."
Lattuca said that the company hadn't paid a ransom, but TechCrunch noted that the data had disappeared from the dark web - a development which sometimes indicates that the group has entered negotiations with its victim.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Gender diversity improvements could be the key to tackling the UK's AI skills shortageNews Encouraging more women to pursue tech careers could plug huge gaps in the AI workforce
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities
-
Volkswagen confirms security ‘incident’ amid ransomware breach claimsNews Volkswagen has confirmed a security "incident" has occurred, but insists no IT systems have been compromised.
-
The number of ransomware groups rockets as new, smaller players emergeNews The good news is that the number of victims remains steady
-
Teens arrested over nursery chain Kido hacknews The ransom attack caused widespread shock when the hackers published children's personal data
