'NetWalker' ransomware explodes thanks to 'as a service' expansion
The gang behind the malware has made $29m since March, according to McAfee
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A ransomware group known as 'NetWalker' has been linked with a spate of attacks on businesses, after pivoting to a 'ransomware as a service' (RaaS) model, with the group offering its tools for sale over the dark web.
While the malware has been observed in various forms since August last year, it has become much more active following an aggressive pivot to a RaaS distribution model. The sudden uptick in attacks has helped the group amassed millions of dollars in ill-gotten gains in just over five months, according to McAfee Advanced Threat Research.
NetWalker is fairly new, having only been around for a year and remaining relativly quiet prior to 2020. The group behind it is similar to those behind Maze and REvil in that they threaten to publish victims' data if ransoms are not paid, McAfee said.
From the start of this year, the gang has been providing the tools and infrastructure for others to launch ransomware attacks in return for affiliate payments. These have been posted on dark market forums, inviting other criminals to become affiliates and help them spread the ransomware. The group reportedly has a preference for those with proven experience in cybercrime and existing access to corporate networks.
"NetWalker RaaS prioritises quality over quantity and is looking for people who are Russian-speaking and have experience with large networks," McAfee noted in its research. "People who already have a foothold in a potential victim's network and can exfiltrate data with ease are especially sought after. This is not surprising, considering that publishing a victims data is part of NetWalker's model."
Since the start of this year, NetWalker ransomware has been used on a number of different targets in western Europe and also the US, with the gang reportedly preferring larger organisations. In June, the University of California was attacked with NetWalker and was forced to negotiate a ransom over the dark web, thought to be $1,140,895. This also follows a similar attack on the University of Michigan.
RELATED RESOURCE
Improving cyber security for remote working
13 recommendations to improve cybersecurity for remote working
The latest victim of the NetWalker group is a threat detection startup called Cygilant, according to TechCrunch. Screenshots of the company's internal network files and directories reportedly appeared on a dark web site associated with the NetWalker group.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Our Cyber Defense and Response Center team took immediate and decisive action to stop the progression of the attack," Christina Lattuca, Cygilant's chief financial officer said in a statement. "We are working closely with third-party forensic investigators and law enforcement to understand the full nature and impact of the attack. Cygilant is committed to the ongoing security of our network and to continuously strengthening all aspects of our security program."
Lattuca said that the company hadn't paid a ransom, but TechCrunch noted that the data had disappeared from the dark web - a development which sometimes indicates that the group has entered negotiations with its victim.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Global demand for this one AI role has skyrocketed 283% in the last year aloneNews AI trainers are now among the most sought-after specialists around the world
-
Huntress extends global partner program access to resellers in small business driveNews The expansion will allow resellers to deliver enterprise-grade security to smaller organizations facing increasing cyber threats
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
