The RaaS that crippled Colonial Pipeline lost the servers it uses to pull off ransomware attacks, while REvil’s gonads shrank in response.
<div class="c-article__content js-reading-content"> <p>DarkSide, the ransomware-as-a-server (RaaS) gang that <a href="https://threatpost.com/pipeline-crippled-ransomware/165963/" target="_blank" rel="noopener">crippled Colonial Pipeline Co.</a> a week ago, <a href="https://threatpost.com/colonial-pays-5m/166147/" target="_blank" rel="noopener">extorted around $5 million</a>, and sent the fuel company a decryption tool that <a href="https://www.bloomberg.com/news/articles/2021-05-13/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom" target="_blank" rel="noopener">reportedly</a> could barely limp through the process of unlocking files, has now been paralyzed itself.</p> <p>In the wee hours of Friday morning, DarkSide, following its own promise to “speak honestly and openly” about problems, ran through a laundry list of them. In a posting on an underground forum observed by Kaspersky researchers and shared with Threatpost, it said that it had lost access to the public part of its infrastructure: Specifically, the servers for its blog, payment processing and denial-of-service (DoS) operations had been seized.</p> <p>DarkSide didn’t specify the country in which those servers operated or whose law enforcement seized them.</p> <div id="attachment_165520" style="width: 310px" class="wp-caption alignright"><a href="https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/?utm_source=April_eBook&utm_medium=ART&utm_campaign=ART" target="_blank" rel="noopener"><img aria-describedby="caption-attachment-165520" loading="lazy" class="wp-image-165520 size-medium" src="https://media.threatpost.com/wp-content/uploads/sites/103/2021/04/21082808/PromoPic2-300x138.png" alt="" width="300" height="138"></a><p id="caption-attachment-165520" class="wp-caption-text">Download “The Evolution of Ransomware” to gain valuable insights on emerging trends amidst rapidly growing attack volumes. Click above to hone your defense intelligence!</p></div> <p>“Since the first version, we have promised to speak honestly and openly about problems,” the gang wrote in an underground-forum post, saying that the money collected by the gang’s founders and affiliates was transferred to an unknown account.</p> <p>“Now these servers are unavailable via SSH, the hosting panels are blocked,” DarkSide said. “Hosting support, apart from information ‘at the request of law-enforcement agencies’, does not provide any other information.”</p> <h2>REvil Sweats Bullets</h2> <p>The DarkSide takedown sent shockwaves through other underground forums, many of which deleted all ransomware topics. As researchers observed, DarkSide’s <a href="https://threatpost.com/revil-apple-ransomware-pay-off/165570/" target="_blank" rel="noopener">fellow RaaS player, REvil</a>, found itself forced to introduce its own new restrictions.</p> <p>The REvil gang announced that it’s instituting pre-moderation for its partner network, and said it would ban any attempt to attack any government, public, educational or healthcare organizations.</p> <p>REvil’s backers commented on DarkSide’s experience, saying that it’s “forced to introduce” these “significant new restrictions”:</p> <ol> <li>Work in the social sector (healthcare, educational institutions) is prohibited;</li> <li>It is forbidden to work on the gov-sector (state) of any country;</li> <li>Before the spacer, the target is agreed with the PP administration: Write the description of the target, its website, zoom info, etc., etc .;</li> </ol> <p>Violators will be kicked out, REvil said, referring to giving out “desh” for free. That’s likely a reference to “deshirfrator,” or “decryptor” in Russian: The tools that typically are as far from free as ransomware attackers can make them. Ransomware actors promise to give their victims these tools in return for extortion money, which many organizations fork over in the often futile belief that they’ll be able to unlock their files.</p> <p>REvil also said that it will likely delete all of its own ransomware topics from the underground forums and “go into private.” The group told its audience to “be a little more active,” and “contact in [private messages].”</p> <h2>What Is This, the RaaS Reformation?</h2> <p>DarkSide itself launched this wave of RaaS back-peddling earlier this week, when the threat actor said that it was only after profit, and that it had no intention to cause political, economic or social disruption. Our bad, they said: We were just after moolah, not the kneecapping of the nation’s infrastructure. We’ll vet our criminal customers better in the future, they promised, calling the Colonial Pipeline attack <a href="https://threatpost.com/darkside-wanted-money-not-disruption/166016/" target="_blank" rel="noopener">“a very big ‘oops.'”</a></p> <p>It was indeed a very big oops, with ripples still spreading a week later. Colonial Pipeline, the supplier of about 45 percent of liquid fuel used in the South and Eastern U.S., proactively shut down its fuel-delivery operations following the ransomware attack a week ago. They pretty much stayed down for five days, only sputtering back to life on Wednesday. Gas shortages and price spikes meanwhile are continuing.</p> <p>Also on Wednesday, President Biden <a href="https://threatpost.com/pipeline-biden-darkside-gas-bags/166112/" target="_blank" rel="noopener">signed an executive order</a> aimed at bolstering the federal government’s cyber-defenses. As it is, the administration is juggling a number of digital attacks, <a href="https://threatpost.com/solarwinds-attackers-dhs-emails/165110/" target="_blank" rel="noopener">including SolarWinds</a>.</p> <p>At any rate, this isn’t the first time that DarkSide has contracted a case of scruples. In October, it <a href="https://threatpost.com/ransomware-20k-donation-charities/160386/" target="_blank" rel="noopener">tried to send $20,000 in donations</a> to charities in a “we’re actually the good guys” display that was likely intended to draw attention to future data dumps, as experts said at the time. It was an empty gesture: The charities – The Water Project and Children International – refused the money.</p> <p>And, before the Colonial Pipeline attack, DarkSide, like <a href="https://threatpost.com/babuk-ransomware-gang-mulls-retirement/165742/" target="_blank" rel="noopener">similar Robin Hood wannabes</a>, already had an ethics code that prohibited attacks against hospitals, hospices, schools, universities, non-profit organizations and government agencies — similar to REvil’s new veil of ethics.</p> <p>When the Babuk gang first crawled out of the muck, it too portrayed itself as a gang with morals. The <a href="https://blog.cyberint.com/babuk-locker" target="_blank" rel="noopener">Babuk operators also said</a> they wouldn’t attack hospitals, nonprofits (unless they support LGBT or Black Lives Matter that is, presumably demonstrating their biases), small businesses (under $4 million in annual revenue: Data they claimed to have gathered from ZoomInfo business-information service) and schools (except for universities). Everybody else was fair game, including plastic surgery and dental clinics (presumably demonstrating that the operators may have suffered from poor dentistry or botched tummy tucks), and major universities.</p> <p>After <a href="https://threatpost.com/babuk-ransomware-gang-mulls-retirement/165742/" target="_blank" rel="noopener">Babuk attacked</a> the Washington D.C. Metropolitan Police Department in April, Randy Pargman, a 15-year veteran of the FBI and current vice president of threat hunting and counterintelligence at Binary Defense and long-time Babuk tracker, told Threatpost that the operators behind the RaaS offering either truly don’t want to attack those entities, or they’re just putting on a public face, telling the world that hey, we’re not all that bad.</p> <p>Just because a ransomware outfit has a code of ethics doesn’t mean that all of its affiliates follow it, though. Early on in the pandemic, several ransomware gangs pledged to spare hospitals because of the ongoing COVID-19 scourge. The Maze and DoppelPaymer groups, for instance, said they would not target medical facilities and, if accidentally hit, would provide the decryption keys at no charge. The Netwalker operators, meanwhile, also said they would not target hospitals. However, if accidentally hit, the hospital would still have to pay the ransom.</p> <p>Those promises haven’t been kept: Cybercriminals <a href="https://threatpost.com/cyberattacks-healthcare-orgs-coronavirus-frontlines/154768/" target="_blank" rel="noopener">haven’t exempted medical professionals</a>, hospitals or healthcare orgs on the frontlines of the coronavirus pandemic when it comes to cyberattacks, including ransomware and other malware, and there’s little reason to believe that REvil’s new code of ethics will be any different.</p> <p>Some groups make no pretense at having even a veneer of honor: In September, employees at Universal Health Services (UHS), a Fortune-500 owner of a nationwide network of hospitals, <a href="https://threatpost.com/ransomware-hits-hospitals-hardest/162096/" target="_blank" rel="noopener">reported widespread outages</a> that resulted in delayed lab results, a fallback to pen and paper, and patients being diverted to other hospitals. The culprit turned <a href="https://threatpost.com/universal-health-ransomware-hospitals-nationwide/159604/" target="_blank" rel="noopener">out to be the Ryuk ransomware</a>, which locked up hospital systems for days. That group has never made any attempt at demonstrating a conscience.</p> <p><b>Download our exclusive FREE Threatpost Insider eBook, </b><b><i>“</i></b><a href="https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/?utm_source=April_eBook&utm_medium=ART&utm_campaign=ART"><b><i>2021: The Evolution of Ransomware</i></b></a><b><i>,”</i></b><b> to help hone your cyber-defense strategies against this growing scourge. We go beyond the status quo to uncover what’s next for ransomware and the related emerging risks. Get the whole story and </b><a href="https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/?utm_source=April_eBook&utm_medium=ART&utm_campaign=ART"><b>DOWNLOAD</b></a><b> the eBook now – on us!</b></p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="DarkSide Ransomware Suffers ‘Oh, Crap!’ Server Shutdowns" data-url="https://threatpost.com/darksides-servers-shutdown/166187/" data-counters="yes" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/hacks/">Hacks</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/malware-2/">Malware</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/web-security/">Web Security</a></li> </ul> </div> </div> </footer> </div>