Ragnar Locker vows to leak data if victim contacts the police

The ransomware gang said victims hiring "professional negotiators" are making the recovery process worse

The Ragnar Locker group, which has hit large companies with ransomware attacks, has warned it will leak victims’ data if they contact the police or FBI. 

The hacking group said it would publish full data of victims if they contacted any law enforcement agencies in an announcement on its darknet website.

The ransomware gang said victims hiring "professional negotiators" are making the recovery process worse, as these negotiators often work with law enforcement through data recovery companies, according to Bleeping Computer.

"So from this moment we warn all our clients, if you will hire any recovery company for negotiations or if you will send requests to the police/FBI/investigators, we will consider this as a hostile intent and we will initiate the publication of whole compromised data immediately," a note read on its website.

Ilia Kolochenko, founder of ImmuniWeb, told IT Pro that such would disincentivize many victims from contacting the authorities.

“Nonetheless, in many ransomware cases, law enforcement agencies are of little to no help for the victims being overloaded with pending cases and complex investigations. But hiring external or internal professionals to meticulously investigate the incident is crucial for all victimized companies,” he said.

Chris Sedgwick, director of security operations at cyber security firm Talion, told ITPro the motive behind this announcement is to encourage more victims to pay their ransom demands. 

Related Resource

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Whitepaper title above a red triangle with an exclamation point insideFree download

“However, while this is a serious threat that should not be ignored, it is worth considering how Ragnar Locker will know when a company has contacted law enforcement, especially if they are working behind the scenes?! This seems to be more of a scare technique, designed to cause panic,” Sedgwick said.

Martin Jartelius, CSO at Outpost24, told IT Pro this must be seen as a partial success for the pressure applied after some earlier breaches aroused substantial attention from the US government, where the exerted pressure led to a temporary dismantling of one threat actors’ operations. 

“Clearly the group is uncomfortable with such attention, which can only be seen as a positive change. This can’t continue to be a relatively risk-free form of digital international sabotage,” Jartelius said.

Featured Resources

Seven steps to connect and empower your frontline workers

How business leaders can improve communication with a secure platform

Free download

Create what’s next

The future of collaboration and productivity

Free Download

Leveraging the cloud without relinquishing control

Your data. Their cloud.

Free download

Re-architecting for nonstop innovation

Unlocking productivity, scalability, and lower costs for cloud natives

Free Download

Recommended

SMBs urged to update software ahead of Black Friday
e commerce

SMBs urged to update software ahead of Black Friday

25 Nov 2021
US adds dozen Chinese tech companies to trade blacklist
Policy & legislation

US adds dozen Chinese tech companies to trade blacklist

25 Nov 2021
RATDispenser evades nine in ten anti-virus engines
Security

RATDispenser evades nine in ten anti-virus engines

24 Nov 2021
US government warns of increased risk of ransomware over holiday season
ransomware

US government warns of increased risk of ransomware over holiday season

24 Nov 2021

Most Popular

Looking beyond the obvious: What’s best for multi-cloud?
Sponsored

Looking beyond the obvious: What’s best for multi-cloud?

8 Nov 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

12 Nov 2021
How to speed up Microsoft's Windows 11
Microsoft Windows

How to speed up Microsoft's Windows 11

9 Nov 2021