Interview The first rule of being a ransomware negotiator is that you don't admit you're a ransomware negotiator at least not to LockBit or another cybercrime gang.
Instead, these negotiators portray themselves as simply company representatives, said Drew Schmitt, a professional ransomware negotiator and principal threat analyst at cybersecurity firm GuidePoint Security.
"The biggest reason is because most ransomware groups specifically and explicitly say: 'We don't want to work with a negotiator. If you do bring a negotiator to the table, we're just going to post your stuff anyway,'" Schmitt told The Register.Hence the need to masquerade as a regular employee.
Ransomware is, of course, malware that once on a network scrambles all the valuable files it can find, and demands a payment to decrypt and restore the information. Lately, gangs also steal copies of the data prior to encrypting it so that they can leak or sell it if the demand isn't paid. Sometimes they just siphon the files and don't bother to encrypt them. Sometimes the crooks use the purloined files to harass or exploit a victim's customers or users. There's all manner of things extortionists can do and demand once they are on your computers and have your data.
Schmitt said he negotiates one or two ransoms a month, and victim organizations range from very small businesses to major enterprises, spanning all industries. Manufacturing, technology, construction, government, and healthcare were the hardest hit in the second quarter of this year, according to research done for his company's latest extortionware report.
I've also seen initial demands of $25 million ... they are all over the place
He said he once saw a ransom demand from a "less-sophisticated group" who wanted just $2,000."But I've also seen initial demands of $25 million," he added. "So they are all over the place."
Schmitt said he has, on two occasions, negotiated ransoms down to zero dollars. "Both in different kinds of healthcare, that when we went to the table and said, 'Hey, we're a healthcare organization. We're responsible for saving lives,' they basically said, 'We're sorry. We're going to give you a free decryptor.'"
Of course, these are the outliers, and some groups such as Hive specifically target the healthcare industry on the assumption that because lives and highly sensitive personal data are at stake, among other factors, hospitals are more likely to pay up to make the whole mess go away.
In fact, a report earlier this year from Sophos stated that 66 percent of surveyed healthcare organizations were hit by ransomware in 2021 up from 34 percent the year before, representing a 94 percent increase.
As ransomware and pure extortion become solid sources of income for miscreants, there's naturally been a rise in demand for things like cyber-insurance and ransomware negotiators, who act as intermediaries between the ransomware gang and the victim. Sometimes you may want to put someone between you and the crims, someone who can make the cryptocurrency payment happen, or haggle down the demand, or get the decryptor from the extortionists, and so on.
According to research published in March by Palo Alto Networks' incident response team, the average ransom demand in 2021, for attacks it was aware of, was $2.2 million, a 144 percent increase from the year prior. Meanwhile, the average payment last year jumped to $541,010, up 78 percent from 2020.
Schmitt started working in incident response (IR) and threat intelligence about six years ago, and said he "fell into" ransomware negotiations in 2019.
"It was a natural progression of working in incident response," he said. As ransomware infections became more prevalent, Schmitt started moving up the IR ladder and playing various roles in the investigation and response process. "And one of those ended up being a negotiation with a threat actor."
Back in the day, circa 2019, these negotiations happened via email. But since then, ransomware gangs have matured and evolved business operations to include instant messaging with victims to figure out deals, affiliates to help spread the malware, and employees with non-technical remits, as the larger, above-ground world learned through the Conti leaks earlier this year.
These days, most crime groups have their own websites through which they operate, and some have PR and marketing departments as well as in-house help desks.
Rather than faff about with email, "now it's usually just a URL" directing a victim to the extortionists' Tor-hidden website, and communication between victim and crook happens in a chat box displayed within the Tor browser, Schmitt said. This is the point at which Schmitt usually gets called in to help with the incident response and, sometimes, ransomware negotiations.
The negotiation process itself involves bringing all the key business units to the table: C-suite executives, cybersecurity analysts, lawyers, HR, and PR representatives.
"All the critical teams that are going to be involved in the administrative response in addition to the technical response," Schmitt said. "All of those players are going to be involved to determine what the negotiation strategy looks like."
The first question they need to answer, however, is whether to negotiate with the criminals at all.
US federal agencies say organizations should not pay ransom demands [PDF], and some private security firms even suggest this exposes businesses to subsequent ransomware attacks. Regardless, it's not a simple question to answer, and the decision to negotiate or not is two-pronged, we're told.
How is this going to impact our brand if we're exposed on a ransomware leak site?
"One is looking at it from a purely technical perspective," Schmitt said. This includes determining if the company has the capacity to restore from backups data scrambled by the ransomware, decrypt the files with a free tool, or otherwise bring the IT environment back online without paying a ransom.
"And then the other side is legally based," he said. "This is where you start answering questions about: how is this going to impact our brand if we're exposed on a ransomware leak site? How is this going to potentially impact compliance if we have certain types of data exposed on a ransomware leak site? What are the risks associated with this, and what are our options?"
One thought that Schmitt said doesn't usually come up in the discussion unless the criminal gang has been sanctioned by the US Treasury or a similar body, in which case it's illegal to pay a ransom to them is the ethics of paying a ransom that, in turn, finances additional illicit activities and potentially oppressive regimes that back or orchestrate ransomware campaigns.
"If I'm being totally honest, there's just not a lot of discussion of kind of where the funds go after the fact," he admitted.
LockBit remains the most prolific gang over the past two years, Schmitt said, adding that Conti also kept his fellow negotiators busy before that group disbanded to form other gangs.
And each of these crime orgs have their own quirks, histories, and methods, which can be useful to know and exploit during the negotiation process.
"We keep detailed notes of all the interactions that we have from various threat groups, and then we use that to our advantage this technique might work better than that technique, or this group is known to negotiate, or you can't push that group very long before they'll get bored and move on," Schmitt said. "They all have traits that we use to make sure we're not pushing the wrong buttons and giving us the highest chance of success, for lowering the ransom as much as possible."
However, the criminals have typically done their homework, too. For example: researching a victim organization's cyber insurance policy.
"Fairly often, we'll see this as a negotiation tactic," Schmitt said. "'We've found your insurance policy, we know you have coverage in the amount of $10 million, so this is where we start.'"
Paying the initial demand doesn't happen very often. There's always some bargaining and quibbling. Corporations also have to factor in recovery costs and other expenses related to the security breach when figuring out what kind of budget they have to tackle the problem, he said.
"But this is where we start," Schmitt commented, referring to the initial demands. "And really from there, it is the traditional back and forth negotiation process that you would see in many other business applications or trying to buy a car."
If, that is, you're locked in a room with the car salesperson for days on end while they threaten to leak your private information on a website for all to see, and when they may decide to raise the asking price if you take too long to reach a deal.
Schmitt admitted it's a high-anxiety job. "The stakes are really high," he said. "With incident response in general, and especially ransomware, it's really high stress.
"For more of the clients you're working with, it's the worst point in their career and it might be the worst point they're ever going to have, and you're thrust into that situation of trying to help them get out of the worst time of their career."
See the original post here:
Hi, I'll be your ransomware negotiator today but don't tell the crooks that - The Register
- Tor Browser Has a New WebTunnel Feature to Avoid Censorship - How-To Geek - March 14th, 2024 [March 14th, 2024]
- The CIA Is Now Trying to Recruit Russian Spies On Telegram - TIME - May 18th, 2023 [May 18th, 2023]
- Dark Web Alerts: Identifying Criminal Data Exposure on the Dark Web - Security Boulevard - May 18th, 2023 [May 18th, 2023]
- Mullvad aces security audit with this new privacy tool - TechRadar - May 18th, 2023 [May 18th, 2023]
- Billions of Google Chrome users warned to avoid browser over red alert privacy concerns check your sett... - The US Sun - May 18th, 2023 [May 18th, 2023]
- How the decision on Space Command's home will be made - POLITICO - May 18th, 2023 [May 18th, 2023]
- Bitcoin Mixers: Clearnet vs. Darknet Which Offers Greater Anonymity? - Crypto Mode - April 27th, 2023 [April 27th, 2023]
- Matt Taibbi: Report on the Censorship-Industrial Complex - Scheerpost.com - April 27th, 2023 [April 27th, 2023]
- The Ultimate 2023 Guide to The Tor Browser Explained - Pixel Privacy - January 31st, 2023 [January 31st, 2023]
- What is Tor & How Do You Use It? Microsoft 365 - January 17th, 2023 [January 17th, 2023]
- Improving privacy when browsing web: Alternative browsers and chrome extensions - HackRead - October 19th, 2022 [October 19th, 2022]
- Tor Browser Bundle - Free download and software reviews - CNET Download - October 11th, 2022 [October 11th, 2022]
- Hacktivists seek to aid Iran protests with cyberattacks and tips on how to bypass internet censorship - CNBC - October 11th, 2022 [October 11th, 2022]
- This security firm claims to have the right tool for your privacy, and it's not a VPN - TechRadar - September 15th, 2022 [September 15th, 2022]
- A VPN Isn't the Only Way to Change Your IP Address - CNET - September 11th, 2022 [September 11th, 2022]
- Rewards for Justice Reward Offer for Information on Russian Interference in U.S. Elections - United States Department of State - Department of State - July 29th, 2022 [July 29th, 2022]
- How Tor Is Fightingand BeatingRussian Censorship - WIRED - July 29th, 2022 [July 29th, 2022]
- What Is Incognito Mode And Should You Be Using It? - Forbes - July 29th, 2022 [July 29th, 2022]
- TOR Browser - Onion VPN on the App Store - July 17th, 2022 [July 17th, 2022]
- Tor Browser now bypasses internet censorship automatically - BleepingComputer - July 17th, 2022 [July 17th, 2022]
- The dangers of the dark web: being safe online - Open Access Government - July 13th, 2022 [July 13th, 2022]
- Tor vs VPN: Which One Should You Use? - Dignited - June 30th, 2022 [June 30th, 2022]
- Rewards for Justice Offers Up to $10 Million for Information on Foreign Interference in US Elections - HS Today - HSToday - June 30th, 2022 [June 30th, 2022]
- Kremlin tightens control over Russians' online lives threatening domestic freedoms and the global internet - Jacksonville Journal-Courier - June 30th, 2022 [June 30th, 2022]
- Defence in Amanda Todd 'sextortion' trial zeroes in on missing data - The Tri-City News - June 30th, 2022 [June 30th, 2022]
- Now that 'Roe' has been overturned, it's up to the tech industry to protect our data - Fast Company - June 30th, 2022 [June 30th, 2022]
- QAnon Is Celebrating the Return of Its Leader After 18 Months of Silence - VICE - June 30th, 2022 [June 30th, 2022]
- 3 ways to find out if your passwords are being sold on the Dark Web - Komando - June 22nd, 2022 [June 22nd, 2022]
- EXPLAINER: EFCC 'Linked Naira Marley to the Dark Web'. Here's What You Need to Know About the Internet's Most Hidden Part - FIJ NG - June 11th, 2022 [June 11th, 2022]
- What is the Dark Web? - AOL - May 28th, 2022 [May 28th, 2022]
- Cookie Banners Can Be AnnoyingHere's How To Block Them - WRAL News - May 28th, 2022 [May 28th, 2022]
- DuckDuckGo tries to explain why its browsers won't block some Microsoft web trackers - The Register - May 28th, 2022 [May 28th, 2022]
- Proton VPN Secure Core: what it is and when you should use it - TechRadar - May 28th, 2022 [May 28th, 2022]
- How to Download & Install Tor Browser in Windows 10 - May 7th, 2022 [May 7th, 2022]
- How to Unblock a Webpage from Behind a Firewall - Beebom - May 7th, 2022 [May 7th, 2022]
- Download Tor Browser For Windows & MAC (Offline Installer) - May 1st, 2022 [May 1st, 2022]
- Tor Browser - Dark Web Portal Exposed | Dark Web Wiki - May 1st, 2022 [May 1st, 2022]
- Top 10 dark web links & Tor websites for 2022 - Surfshark - May 1st, 2022 [May 1st, 2022]
- How to Install the Tor Browser on a Chromebook - May 1st, 2022 [May 1st, 2022]
- How to Anonymous access to the dark web with Tor - BollyInside - May 1st, 2022 [May 1st, 2022]
- How to Change the Tor Browser Language - How-To Geek - April 29th, 2022 [April 29th, 2022]
- Bites of Life: Shining Light on the Dark Web - Macalester College The Mac Weekly - April 29th, 2022 [April 29th, 2022]
- How to protect against the weakest link in cybersecurity THE USERS - Security Boulevard - April 29th, 2022 [April 29th, 2022]
- What Is Dark Social and Why It Matters - Legal Talk Network - April 29th, 2022 [April 29th, 2022]
- IP bans - why they happen and how to prevent them - Oneindia - April 29th, 2022 [April 29th, 2022]
- Deep Web Tor Browser - Tor Links - Onion Links (2022) - April 20th, 2022 [April 20th, 2022]
- How to Install and Use the Tor Browser on Linux - April 20th, 2022 [April 20th, 2022]
- The Best VPN for Binance 2022 [How to Use Binance With a VPN] - Cloudwards - April 20th, 2022 [April 20th, 2022]
- Three tactics for security providers in the age of Dark Web collaboration - SecurityInfoWatch - April 20th, 2022 [April 20th, 2022]
- Simple way to Install Tor Browser in Rocky Linux 8 - Linux Shout - March 17th, 2022 [March 17th, 2022]
- Laptop in Veltman apartment had what appeared to be 'hate-related material': docs - Lethbridge News Now - March 17th, 2022 [March 17th, 2022]
- How to Access Blocked Websites anywhere and for Free - BollyInside - March 17th, 2022 [March 17th, 2022]
- Download Tor Browser for Mac - Free - 10.0 - Digital Trends - March 11th, 2022 [March 11th, 2022]
- Open in Tor Browser Get this Extension for Firefox (en-US) - March 11th, 2022 [March 11th, 2022]
- Use Brave Private Browsing with Tor to Hide IP Address - OSXDaily - February 21st, 2022 [February 21st, 2022]
- Are Crypto Transactions More Transparent Than Wire Transfers? - InvestingCube - February 21st, 2022 [February 21st, 2022]
- The Truth about Dark Web Is It Really Dangerous? - Crypto Mode - February 21st, 2022 [February 21st, 2022]
- Tech-Savvy Professionals Among 22 Arrested In Dark Web Narcotics Operation - NDTV - February 15th, 2022 [February 15th, 2022]
- Download Tor Browser for Windows - Free - 11.0.3 - February 1st, 2022 [February 1st, 2022]
- Tor Project heads to Russian court to appeal against censorship - The Daily Swig - February 1st, 2022 [February 1st, 2022]
- Firefox Monitor may remove personal information now from the Internet - Ghacks Technology News - December 9th, 2021 [December 9th, 2021]
- The Real Russia. Today. Reining in an unruly Communist Party Meduza - Meduza - December 9th, 2021 [December 9th, 2021]
- See the stunning mansion Josh Duggar is calling home during his child pornography trial ahead of possible... - The US Sun - December 9th, 2021 [December 9th, 2021]
- Whats the Difference Between the Deep Web and the Dark Web? - How-To Geek - December 9th, 2021 [December 9th, 2021]
- How to Access the Dark Web Complete Guide? - The Bulletin Time - December 7th, 2021 [December 7th, 2021]
- Theres More to Threat Intelligence Than Dark Web Monitoring - Security Boulevard - November 25th, 2021 [November 25th, 2021]
- You have to work on this through the routeras options diet plan, as some items immediately restore previous setup after a forced reboot - ADOTAS - November 25th, 2021 [November 25th, 2021]
- What is Tor (Browser) & How does it work? | CyberNews - November 23rd, 2021 [November 23rd, 2021]
- Privacy-Protective Internet Browser Tor Is Running Low on Servers - Gizmodo - November 23rd, 2021 [November 23rd, 2021]
- Yes, the Internet has become safer but a VPN is still needed - TechGenix - November 19th, 2021 [November 19th, 2021]
- Scots businessman caught with the 'most serious' category of child abuse images jailed - Scottish Daily Record - November 19th, 2021 [November 19th, 2021]
- Anna and Josh Duggar welcomed daughter Madyson Lily on October 23, their 7th child * starcasm.net - Starcasm - November 17th, 2021 [November 17th, 2021]
- Tor Browser (Alpha) 11.0.9 Download | TechSpot - November 5th, 2021 [November 5th, 2021]
- US government offers $10 million bounty for information on Colonial Pipeline hackers - The Verge - November 5th, 2021 [November 5th, 2021]
- The Tor Browser: What is it and why would you use it ... - October 24th, 2021 [October 24th, 2021]
- Tor Explained: What is Tor? How Does It Work? Is It Illegal? - October 21st, 2021 [October 21st, 2021]
- Alternatives to Using a VPN That Provided Excellent Anonymity While Online - TechBullion - October 21st, 2021 [October 21st, 2021]
- Slicing open The Onion Router (Tor) with no tears - ComputerWeekly.com - October 19th, 2021 [October 19th, 2021]
- What is the dark web? - fox4kc.com - October 19th, 2021 [October 19th, 2021]
- Use of VPNs in India spiking because of blocked websites, experts say ban proposal will not help users - India Today - October 19th, 2021 [October 19th, 2021]