DarkSide May Not Stay Dark For Long

There are few more serous forms of hacking than malware attacks designed to extort Ransom. Ransomware denies the computer owner the ability to make further use of the computer systems. In some cases, it has resulted in the loss of life because critical medical systems were attacked and could not be brought back live on time. One of the most potent Ransomware groups is known as  Darkside

DarkSide is believed to be based in Russia, but is not sponsored by the government there and they have previously claimed that its members are not allowed to mount attacks on targets in Russia, Ukraine, Georgia, or Belarus, suggesting some toleration of their criminal activity by these states. 

When US President Joe Biden met  Russian president Vladimir Putin at a summit in Switzerland this month, he called for mutual cooperation to end the ransom  exploits of Darkside and other Russian-based hackers, who are accused by the US Government of being responsible for both the Colonial Pipeline and the much larger SolarWinds attacks.

While DarkSide, was allegedly disbanded after carrying out the Colonial Pipeline ransomware attack, they may come back soon, using the same method under a different name, according to US intelligence sources

Research published recently by London-based blockchain analytics firm Elliptic appears to show that DarkSide extorted more than $90m in Bitcoin before supposedly halting its illegal activities. US cyber security experts have warned that 'certain countries' were turning a blind eye to the cyber criminal activity emanating from within their borders. 

Speaking to reprters, the acting Director of the National Counter Intelligence and Security Center Michael Orlando said: "We do know that countries like Russia and China, Iran and others certainly create safe havens for criminal hackers as long as they don’t conduct attacks against them."But that’s a challenge for us that we’re going to have to work through as we figure out how to counter ransomware attacks."

Assistant Attorney General of the Department of Justice’s National Security Division John Demers told CNBC that the Colonial Pipeline attack highlighted the issue of "nation-states serving as safe havens for criminal cyber-actors." Demers said that "nation-states aren’t doing their part to investigate and root out hacking activity happening within their borders." He went on to suggest that DarkSide, far from going dark, could be "just off renaming themselves.... Groups like that will come back.”

CNBC:     Elliptic:     TechRepublic:   Infosecurity Magazine:   The Cybersecurity:    Intellfence:   jioforme:  Image: Unsplash

You Might Also Read:

Russian Spy Chief Says SolarWinds Was An Inside Job:

 

« Remote Working & Cyber Security
Negotiating Ransom: To Pay Or Not? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

Kaine Mathrick Tech (KMT)

Kaine Mathrick Tech (KMT)

KMT deliver comprehensive cyber-first outsourced technology support and solutions that scale with your business.

Atlantica Digital

Atlantica Digital

Atlantica design and create highly innovative software solutions and solid, scalable and secure IT infrastructures for a constantly evolving market.