id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
13,867 | Even the DarkSide actors themselves admit that they just buy access to company networks — they have no idea how access was acquired. | [
{
"id": 43011,
"label": "malware",
"start_offset": 9,
"end_offset": 17
},
{
"id": 43012,
"label": "identity",
"start_offset": 52,
"end_offset": 56
},
{
"id": 43013,
"label": "location",
"start_offset": 57,
"end_offset": 60
}
] | [] | [] |
13,869 | The DarkSide ransomware DarkSide offers its RaaS to affiliates for a percentage of the profits. | [] | [] | [] |
13,875 | August 2020: DarkSide introduces its ransomware. | [] | [] | [] |
13,877 | November 2020: | [] | [] | [] |
13,879 | The group invites other criminals to use its service. | [] | [] | [] |
13,880 | A DarkSide data leak site is later discovered. | [] | [] | [] |
13,881 | November 2020: | [] | [] | [] |
13,883 | December 2020: | [] | [] | [] |
13,885 | March 2021: | [] | [] | [] |
13,886 | DarkSide releases version 2.0 of its ransomware with several updates. | [] | [] | [] |
13,887 | May 2021: | [] | [] | [] |
13,888 | DarkSide launches the Colonial Pipeline attack. | [] | [] | [] |
13,890 | In our analysis of DarkSide samples, we saw that phishing, remote desktop protocol (RDP) abuse, and exploiting known vulnerabilities are the tactics used by the group to gain initial access. | [
{
"id": 43060,
"label": "attack-pattern",
"start_offset": 49,
"end_offset": 57
},
{
"id": 43061,
"label": "attack-pattern",
"start_offset": 59,
"end_offset": 82
},
{
"id": 43062,
"label": "malware",
"start_offset": 84,
"end_offset": 87
},
{
"id": 43063,
"label": "location",
"start_offset": 96,
"end_offset": 99
},
{
"id": 43064,
"label": "location",
"start_offset": 133,
"end_offset": 136
}
] | [] | [] |
13,892 | Throughout the reconnaissance and gaining-entry phases, we saw these legitimate tools used for specific purposes: PowerShell: for reconnaissance and persistence Metasploit Framework: for reconnaissance Mimikatz: for reconnaissance BloodHound: for reconnaissance Cobalt Strike: for installation For modern ransomware like DarkSide, gaining initial access no longer immediately leads to ransomware being dropped. | [
{
"id": 43066,
"label": "location",
"start_offset": 31,
"end_offset": 34
},
{
"id": 43067,
"label": "attack-pattern",
"start_offset": 117,
"end_offset": 127
},
{
"id": 43068,
"label": "location",
"start_offset": 148,
"end_offset": 151
},
{
"id": 43069,
"label": "malware",
"start_offset": 165,
"end_offset": 175
},
{
"id": 43070,
"label": "tools",
"start_offset": 206,
"end_offset": 214
},
{
"id": 43071,
"label": "malware",
"start_offset": 235,
"end_offset": 245
},
{
"id": 43072,
"label": "malware",
"start_offset": 266,
"end_offset": 279
},
{
"id": 43073,
"label": "threat-actor",
"start_offset": 326,
"end_offset": 334
}
] | [] | [] |
13,894 | Lateral movement and privilege escalation Lateral movement is a key discovery phase in the modern ransomware process. | [
{
"id": 43077,
"label": "location",
"start_offset": 18,
"end_offset": 21
},
{
"id": 43078,
"label": "attack-pattern",
"start_offset": 22,
"end_offset": 42
}
] | [] | [] |
13,897 | The group then continues its lateral movement through the system, eventually using the DC network share to deploy the ransomware to connected machines. | [] | [] | [] |
13,898 | Some of the known lateral movement methods deployed by DarkSide use PSExec and RDP. | [
{
"id": 43087,
"label": "malware",
"start_offset": 68,
"end_offset": 74
},
{
"id": 43088,
"label": "location",
"start_offset": 75,
"end_offset": 78
},
{
"id": 43089,
"label": "malware",
"start_offset": 79,
"end_offset": 82
}
] | [] | [] |
13,900 | Exfiltration As is common practice with double extortion ransomware, critical files are exfiltrated prior to the ransomware being launched. | [] | [] | [] |
13,901 | This is the riskiest step so far in the ransomware execution process, as data exfiltration is more likely to be noticed by the victim organization’s security team. | [] | [] | [] |
13,902 | It is the last step before the ransomware is dropped, and the attack often speeds up at this point to complete the process before it is stopped. | [] | [] | [] |
13,903 | For exfiltration, we saw the following tools being used: 7-Zip: a utility used for archiving files in preparation for exfiltration Rclone and Mega client: tools used for exfiltrating files to cloud storage PuTTy: an alternative application used for network file transfer DarkSide uses several Tor-based leak sites to host stolen data. | [
{
"id": 48714,
"label": "SOFTWARE",
"start_offset": 60,
"end_offset": 65
},
{
"id": 48716,
"label": "SOFTWARE",
"start_offset": 146,
"end_offset": 157
},
{
"id": 48718,
"label": "tools",
"start_offset": 298,
"end_offset": 301
},
{
"id": 48715,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 142
},
{
"id": 48717,
"label": "SOFTWARE",
"start_offset": 210,
"end_offset": 215
},
{
"id": 48719,
"label": "malware",
"start_offset": 276,
"end_offset": 285
}
] | [] | [] |
13,904 | The file-sharing services used by the group for data exfiltration include Mega and PrivatLab. | [
{
"id": 48720,
"label": "tools",
"start_offset": 74,
"end_offset": 79
},
{
"id": 48721,
"label": "tools",
"start_offset": 83,
"end_offset": 92
}
] | [] | [] |
13,905 | Execution and impact The execution of the actual ransomware occurs next. | [] | [] | [] |
13,906 | The DarkSide ransomware shares many similarities with REvil in this step of the process, including the structure of ransom notes and the use of PowerShell to execute a command that deletes shadow copies from the network. | [
{
"id": 48722,
"label": "malware",
"start_offset": 4,
"end_offset": 13
},
{
"id": 48723,
"label": "malware",
"start_offset": 54,
"end_offset": 59
},
{
"id": 48724,
"label": "tools",
"start_offset": 144,
"end_offset": 155
}
] | [] | [] |
13,908 | In addition to PowerShell, which is used to install and operate the malware itself, the group reportedly uses Certutil and Bitsadmin to download the ransomware. | [
{
"id": 48726,
"label": "tools",
"start_offset": 16,
"end_offset": 26
},
{
"id": 48728,
"label": "tools",
"start_offset": 124,
"end_offset": 133
},
{
"id": 48727,
"label": "tools",
"start_offset": 111,
"end_offset": 120
}
] | [] | [] |
13,909 | It uses two encryption methods, depending on whether the target operating system is Windows or Linux: A ChaCha20 stream cipher with RSA-4096 is used on Linux, and Salsa20 with RSA-1024 is used on Windows. | [
{
"id": 48732,
"label": "SOFTWARE",
"start_offset": 163,
"end_offset": 171
},
{
"id": 48729,
"label": "SOFTWARE",
"start_offset": 84,
"end_offset": 92
},
{
"id": 48730,
"label": "SOFTWARE",
"start_offset": 95,
"end_offset": 100
},
{
"id": 48731,
"label": "SOFTWARE",
"start_offset": 152,
"end_offset": 157
},
{
"id": 48733,
"label": "SOFTWARE",
"start_offset": 196,
"end_offset": 203
}
] | [] | [] |
13,910 | The following figure shows a sample ransom note from DarkSide. | [] | [] | [] |
13,911 | Figure 1. | [] | [] | [] |
13,912 | A Darkside ransom note | [] | [] | [] |
13,913 | It is interesting to note that DarkSide’s ransom note is similar to that of Babuk, which might indicate that these two families share a link. | [
{
"id": 48734,
"label": "malware",
"start_offset": 31,
"end_offset": 42
},
{
"id": 48735,
"label": "malware",
"start_offset": 76,
"end_offset": 81
}
] | [
{
"id": 450,
"from_id": 48734,
"to_id": 48735,
"type": "related-to"
}
] | [] |
13,914 | DarkSide ransomware targets | [
{
"id": 48737,
"label": "malware",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
13,915 | Based on the group’s Tor leak sites, DarkSide determines whether to pursue targeting a potential victim organization by primarily looking at that organization’s financial records. | [
{
"id": 48738,
"label": "malware",
"start_offset": 37,
"end_offset": 46
}
] | [] | [] |
13,916 | It also uses this information to determine the amount of ransom to demand, with a typical ransom demand amounting to anywhere between US$200,000 and US$2 million. | [] | [] | [] |
13,917 | Reports say that, based on the leak sites, there are at least 90 victims affected by DarkSide. | [
{
"id": 48739,
"label": "malware",
"start_offset": 85,
"end_offset": 93
}
] | [] | [] |
13,918 | In total, more than 2 TB of stolen data is currently being hosted on DarkSide sites, and 100% of victims’ stolen files are leaked. | [
{
"id": 48740,
"label": "malware",
"start_offset": 69,
"end_offset": 77
}
] | [] | [] |
13,919 | The actors behind Darkside have stated that they avoid targeting companies in certain industries, including healthcare, education, the public sector, and the nonprofit sector. | [
{
"id": 48741,
"label": "malware",
"start_offset": 18,
"end_offset": 27
},
{
"id": 48744,
"label": "identity",
"start_offset": 0,
"end_offset": 10
}
] | [
{
"id": 451,
"from_id": 48741,
"to_id": 48744,
"type": "attributed-to"
}
] | [] |
13,920 | Organizations in manufacturing, finance, and critical infrastructure have been identified in Trend Micro data as targets. | [] | [] | [] |
13,921 | Based on Trend Micro data, the US is by far DarkSide’s most targeted country, at more than 500 detections, followed by France, Belgium, and Canada. | [
{
"id": 48745,
"label": "malware",
"start_offset": 44,
"end_offset": 55
},
{
"id": 48748,
"label": "location",
"start_offset": 127,
"end_offset": 134
},
{
"id": 48747,
"label": "location",
"start_offset": 119,
"end_offset": 125
},
{
"id": 48746,
"label": "location",
"start_offset": 31,
"end_offset": 34
},
{
"id": 48749,
"label": "location",
"start_offset": 140,
"end_offset": 146
}
] | [
{
"id": 452,
"from_id": 48745,
"to_id": 48746,
"type": "targets"
},
{
"id": 455,
"from_id": 48745,
"to_id": 48749,
"type": "targets"
},
{
"id": 453,
"from_id": 48745,
"to_id": 48747,
"type": "targets"
},
{
"id": 454,
"from_id": 48745,
"to_id": 48748,
"type": "targets"
}
] | [] |
13,922 | As previously mentioned, DarkSide avoids victimizing companies in CIS countries. | [
{
"id": 48750,
"label": "malware",
"start_offset": 25,
"end_offset": 34
},
{
"id": 48751,
"label": "location",
"start_offset": 66,
"end_offset": 79
}
] | [
{
"id": 456,
"from_id": 48750,
"to_id": 48751,
"type": "related-to"
}
] | [] |
13,923 | Part of the ransomware execution code checks for the geolocation of potential victims to avoid companies in these countries, although the group would likely be aware of the location of a target organization long before the ransomware is executed. | [] | [] | [] |
13,924 | That the group admittedly spares companies in CIS countries could be a clue to where DarkSide actors are residing. | [
{
"id": 48752,
"label": "malware",
"start_offset": 85,
"end_offset": 94
},
{
"id": 48753,
"label": "location",
"start_offset": 46,
"end_offset": 59
}
] | [
{
"id": 457,
"from_id": 48752,
"to_id": 48753,
"type": "related-to"
}
] | [] |
13,925 | It is possible that they do this to avoid law enforcement action from these countries, since the governments of some of these countries do not persecute criminal acts such as DarkSide’s if they are done on foreign targets. | [
{
"id": 48754,
"label": "malware",
"start_offset": 175,
"end_offset": 186
}
] | [] | [] |
13,926 | After the Colonial Pipeline attack, DarkSide released a statement on one of its leak sites clarifying that the group did not wish to create problems for society and that its goal was simply to make money. | [
{
"id": 48755,
"label": "threat-actor",
"start_offset": 36,
"end_offset": 45
}
] | [] | [] |
13,927 | There is no way to verify this statement, but we know that the group is still quite active. | [] | [] | [] |
13,928 | As previously mentioned, DarkSide actors announced that they had stolen data from three more victims since the Colonial Pipeline attack. | [
{
"id": 43195,
"label": "threat-actor",
"start_offset": 25,
"end_offset": 33
}
] | [] | [] |
13,929 | MITRE ATT&CK tactics and techniques | [] | [] | [] |
13,930 | The following are the MITRE ATT&CK tactics and techniques associated with DarkSide. | [
{
"id": 48756,
"label": "threat-actor",
"start_offset": 74,
"end_offset": 82
}
] | [] | [] |
13,931 | Conclusion | [] | [] | [] |
13,932 | Ransomware is an old but persistently evolving threat. | [] | [] | [] |
13,933 | As demonstrated by the recent activities of DarkSide, modern ransomware has changed in many aspects: bigger targets, more advanced extortion techniques, and farther-reaching consequences beyond the victims themselves. | [
{
"id": 43202,
"label": "malware",
"start_offset": 44,
"end_offset": 52
}
] | [] | [] |
13,934 | Ransomware actors are no longer content with simply locking companies out of their computers and asking for ransom. | [] | [] | [] |
13,935 | Now they are digging deeper into their victims’ networks and looking for new ways to monetize their activities. | [] | [] | [] |
13,936 | For example, a compromised cloud server can go through a complete attack life cycle, from the initial compromise to data exfiltration to resale or use for further monetization. | [] | [] | [] |
13,937 | Compromised enterprise assets are a lucrative commodity on underground markets; cybercriminals are well aware of how to make money from attacking company servers. | [] | [] | [] |
13,938 | In the Colonial Pipeline attack, DarkSide used double extortion. | [
{
"id": 48757,
"label": "malware",
"start_offset": 34,
"end_offset": 43
}
] | [] | [] |
13,939 | But some ransomware actors have gone even further. | [] | [] | [] |
13,940 | Jon Clay, Director of Global Threat Communications at Trend Micro, outlines the phases of ransomware: | [
{
"id": 48758,
"label": "identity",
"start_offset": 0,
"end_offset": 9
},
{
"id": 48759,
"label": "identity",
"start_offset": 54,
"end_offset": 65
}
] | [
{
"id": 458,
"from_id": 48759,
"to_id": 48758,
"type": "related-to"
}
] | [] |
13,941 | Phase 1: Just ransomware. | [] | [] | [] |
13,942 | Encrypt the files, drop the ransom note, and wait for the payment. | [] | [] | [] |
13,943 | Phase 2: Double extortion. | [] | [] | [] |
13,944 | Phase 1 + data exfiltration and threatening data release. | [] | [] | [] |
13,945 | Maze was one of the first documented cases of this. | [
{
"id": 48760,
"label": "malware",
"start_offset": 0,
"end_offset": 5
}
] | [] | [] |
13,946 | Phase 3: Triple extortion. | [] | [] | [] |
13,947 | Phase 1 + Phase 2 + threatening DDoS. | [] | [] | [] |
13,948 | SunCrypt, RagnarLocker, and Avaddon were among the first groups documented doing this. | [
{
"id": 48764,
"label": "threat-actor",
"start_offset": 10,
"end_offset": 22
},
{
"id": 48765,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 8
},
{
"id": 48766,
"label": "threat-actor",
"start_offset": 28,
"end_offset": 36
}
] | [] | [] |
13,949 | Phase 4: Quadruple extortion. | [] | [] | [] |
13,950 | Phase 1 (+ possibly Phase 2 or Phase 3) + directly emailing the victim’s customer base or having contracted call centers contact customers. | [] | [] | [] |
13,951 | In fact, as detailed in security reports, DarkSide offers both the DDoS and call center options. | [
{
"id": 48767,
"label": "threat-actor",
"start_offset": 43,
"end_offset": 52
}
] | [] | [] |
13,952 | The group is making quadruple extortion available to its affiliates and showing a clear sign of innovation. | [] | [] | [] |
13,953 | In cybercrime, there are no copyright or patent laws for tools and techniques. | [] | [] | [] |
13,954 | Innovation is as much about quickly and completely copying others’ best practices as it is about coming up with new approaches. | [] | [] | [] |
13,955 | Ransomware will only continue to evolve. | [] | [] | [] |
13,956 | Organizations therefore need to take the time to put in place an incident response plan focused on the new model of ransomware attacks. | [] | [] | [] |
13,957 | Unfortunately, some organizations may be putting cybersecurity on the back burner. | [] | [] | [] |
13,958 | For example, some security experts noted that Colonial Pipeline was using a previously exploited vulnerable version of Microsoft Exchange, among other cybersecurity lapses. | [] | [] | [] |
13,959 | A successful attack on a company providing critical services will have rippling effects that will harm multiple sectors of society, which is why protecting these services should be a top priority. | [] | [] | [] |
13,960 | In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.” | [
{
"id": 48769,
"label": "identity",
"start_offset": 49,
"end_offset": 68
},
{
"id": 48768,
"label": "identity",
"start_offset": 5,
"end_offset": 14
},
{
"id": 48770,
"label": "location",
"start_offset": 72,
"end_offset": 77
},
{
"id": 48771,
"label": "location",
"start_offset": 179,
"end_offset": 182
}
] | [
{
"id": 459,
"from_id": 48769,
"to_id": 48768,
"type": "related-to"
},
{
"id": 460,
"from_id": 48769,
"to_id": 48770,
"type": "related-to"
}
] | [] |
13,961 | This attack is a call to action for all organizations to harden their networks against attacks and improve their network visibility. | [] | [] | [] |
13,962 | Trend Micro has a multilayered cybersecurity platform that can help improve your organization’s detection and response against the latest ransomware attacks and improve your organization’s visibility. | [] | [] | [] |
13,963 | Visit the Trend Micro Vision One™ website for more information. | [] | [] | [] |
13,964 | Detailed solutions can be found in our knowledge base article on DarkSide ransomware. | [
{
"id": 43290,
"label": "malware",
"start_offset": 65,
"end_offset": 73
}
] | [] | [] |
13,965 | Tags APT & Targeted Attacks | Ransomware | Research | Articles, News, Reports | [] | [] | [] |
13,966 | We have been collectively saying in our industry for the last 15-20 years that a layered approach to your security stack is a “best practice,” but as with all best practices, these are ideals rather than reality for so many charged with protecting their organizations. | [] | [] | [] |
13,967 | The vast majority of CISOs are saddled with legacy operating systems and applications, along with a lack of funding. | [] | [] | [] |
13,968 | For many of those in the more mature sectors who struggle less with resources, such as financial and government, this ideal state has been achieved by buying a large number of feature products for each layer. | [] | [] | [] |
13,969 | Then, add more and more people to each layer with the hope that they can effectively coordinate their layers to protect, detect, respond and recover from attacks. | [] | [] | [] |
13,970 | Today’s Challenge | [] | [] | [] |
13,971 | While this strategy has provided a small level of success, it’s not sustainable and definitely not an option for the remaining 90% of companies with resource challenges. | [] | [] | [] |
13,972 | Further complicating the issue is the growing scope and scale of attacks today that are successfully targeting the seams between these layers. | [] | [] | [] |
13,973 | There are many reasons why we are in this overloaded place, drowning in alerts and logs. | [] | [] | [] |
13,974 | But, there is one cause that we can point to that has become especially problematic to the design and operations of security programs – the focus on the “kill chain.” | [] | [] | [] |
13,975 | This focus can be effective to simplify and explain the progression of an attack through the different layers. | [] | [] | [] |
13,976 | However, it doesn’t adequately address the reality of the non-linear nature of attacks. | [] | [] | [] |
13,977 | It also misses the incredible importance of identifying tactics, techniques, and tools used by global threat actor groups today. | [] | [] | [] |
13,978 | (Que the MITRE ATT&CK plug) | [] | [] | [] |
13,979 | Until now. | [] | [] | [] |
13,980 | ATT&CK “…is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.” | [] | [] | [] |
13,981 | ATT&CK enables network defenders and cyber threat intelligence analysts to collaborate through an open community to continuously identify tactics, techniques and tools used by 90+ global threat actor groups to improve their protection and detection. | [] | [] | [] |
13,982 | Today’s Protection | [] | [] | [] |
13,983 | Other innovative trends that work hand in hand with ATT&CK is the move to XDR from EDR. | [
{
"id": 48772,
"label": "SOFTWARE",
"start_offset": 74,
"end_offset": 78
},
{
"id": 48773,
"label": "SOFTWARE",
"start_offset": 83,
"end_offset": 86
}
] | [] | [] |