DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months

Technology

DarkSide, the hacker group behind the Colonial Pipeline ransomware attack earlier this month, received $90 million in bitcoin payments following a nine-month ransomware spree, making it one of the most profitable cybercrime groups.

“In total, just over $90 million in bitcoin ransom payments were made to DarkSide, originating from 47 distinct wallets,” blockchain analytics firm Elliptic said. “According to DarkTracer, 99 organisations have been infected with the DarkSide malware – suggesting that approximately 47% of victims paid a ransom, and that the average payment was $1.9 million.”

Of the total $90 million haul, the DarkSide’s developer is said to have received $15.5 million in bitcoins, while the remaining $74.7 million was split among its various affiliates. FireEye’s research into DarkSide’s affiliate program had previously revealed that its creators take a 25% cut for payments under $500,000 and 10% for ransoms above $5 million, with the lion’s share of the money going to the recruited partners.

password auditor

Elliptic co-founder and chief scientist Dr. Tom Robinson said the “split of the ransom payment is very clear to see on the blockchain, with the different shares going to separate Bitcoin wallets controlled by the affiliate and developer.”

DarkSide, which went operational in August 2020, is just one of many groups that operated as a service provider for other threat actors, or “affiliates,” who used its ransomware to extort targets in exchange for a cut of the profits, but not before threatening to release the data — a tactic known as double extortion.

But in a sudden turn of events, the prolific cybercrime cartel last week announced plans to wind up its Ransomware-as-a-Service (RaaS) affiliate program for good, claiming that its servers had been seized by law enforcement. Its bitcoin wallet was also emptied to an unknown account.

The fallout from the biggest known cyberattack on U.S. energy industry is only the latest example of how a spate of ransomware incidents are increasingly affecting the operations of critical infrastructure and emerging a national security threat. The events have also turned the spotlight on implementing necessary strategies to ensure vital functions remain operational in the event of a significant cyber disruption.

Products You May Like

Articles You May Like

Zach Bryan and Brianna Chickenfry’s Breakup Timeline
Apple’s Affordable Vision Pro Delayed Beyond 2027, to Get an M5 Upgrade Next Year: Ming-Chi Kuo
Book Riot’s Deals of the Day for November 1, 2024
Record numbers of wealthy Americans are making plans to leave the U.S.
What Else to Watch on Election Night if You Need to Tune Out the News