Latest

Related Posts

Unmasking the Top 10 Ransomware Gangs That Dominated 2023

Ransomware groups are rapidly evolving, employing advanced techniques like double extortion to encrypt data and threaten victims with the release of sensitive information.

- Advertisement -

Top 10 Ransomware Gangs That Dominated 2023: Ransomware groups are constantly evolving at a rapid pace by employing a variety of advanced techniques, such as double extortion and other illicit tactics.

The threat actors use a double extortion strategy, encrypting data as well as threatening their victims with the release of sensitive information or data.

- Advertisement -

Recently, security researchers have noted that hackers are increasingly targeting high-profile victims to maximize their profits by using the following methods:

  • Sophisticated malware

  • Demands a larger ransom payment

As well as this, some groups also collaborate or share their resources, making it harder for law enforcement and other security experts to effectively combat their activities.

Ransomware types

Below are a list of all the types of ransomware used by threat actors to achieve their illicit goals:-

  • Locker Ransomware

  • Crypto-Ransomware

  • Scareware

  • Leakware

  • Ransomware As a Service (RaaS)

Two types of ransomware are very popular and widely used by threat actors:

  • Locker ransomware

  • Crypto ransomware

Motivations of ransomware gangs

Below we have listed all the motivations:

  • Financial Gains

  • Ease of Use

  • Powerful Monetisation

  • Evolving Technologies

  • Politics

 Top 10 Ransomware Gangs That Dominated 2023:

Below, we have listed the top 10 notorious ransomware gangs of 2023 that we have discussed in this blog:

  • LockBit

  • Alphv/BlackCat

  • Clop

  • Royal

  • BlackByte

  • Black Basta

  • Ragnar Locker

  • Vice Society

  • Everest

  • BianLian

Here are the top 10 notorious ransomware gangs of 2023:

LockBit

In September 2019, LockBit, a notorious ransomware group, emerged using a global ransomware-as-a-service model.

They targeted global companies and released versions 2.0 and 3.0 in June 2021 and 2022, respectively, featuring:

  • BlackMatter-based encryptors

  • New payment methods

  • A bug bounty program

Despite their innovations, LockBit Black suffered a setback when a developer leaked its builder online, compromising its credibility.

Alphv/BlackCat

Ransomware group BlackCat/AlphV operated in Rust to avoid detection and successfully encrypt victims’ files, and this ransomware group targeted:-

  • Western Digital

  • Sun Pharmaceuticals

Rust-written ALPHV/BlackCat ransomware requires an access token and features encrypted configurations, including:

  • Services/Processes lists

  • Allowlisted directories/Files

  • Stolen credentials

In addition to this, it erases Volume Shadow Copies, exploits privilege escalation, and changes file extensions to “uhwuvzu” using AES and RSA encryption.

Clop

This stealthy group has managed to extort $500 million from several companies worldwide using their collaborative ransomware-as-a-service (RaaS) model.

These operators exploit the following things to target a wide range of entities:-

  • Software vulnerabilities

  • Phishing

Their most notable attack was the hacking of Accellion’s File Transfer Appliance in 2020, which affected global organizations.

In addition to encrypting files with a “.clop” extension, Clop teases data leaks as a means of denying access. As part of the Clop extortion tactics, the operators threaten their victims by exposing or selling their sensitive data, along with requesting high cryptocurrency demands, indicating a sharp shift from typical ransomware trends.

Royal

As one of the most terrifying campaigns of 2022, Royal Ransomware emerged as a sophisticated threat.

Under the code name Dev-0569, they primarily targeted high-profile victims, such as the following to demand millions of dollars:

  • Silverstone Circuit

  • A major US telecom

As opposed to typical ransomware, Dev-0569, operated by a private group, purchases network access directly and employs double extortion tactics.

BlackByte

In July 2021, BlackByte surfaced, attracting the attention of the FBI and the United States Secret Service as a threat to US critical infrastructure.

BlackByte has evolved with multiple keys and continued operations despite the Trustwave decrypter released in October 2021, possibly due to Conti’s rebranding.

Despite its persistence in global attacks, it avoids Russian entities such as:

  • LockBit

  • RansomEXX

Black Basta

This ransomware appeared in February 2022 with several unique characteristics. It erases Volume Shadow Copies and replaces them with:-

  • JPG wallpaper

  • ICO file

With the ChaCha20 algorithm, it encrypts with a hard-coded RSA public key, unlike other solutions that encrypt indiscriminately.

As well as this, the file size determines whether the file is encrypted fully or partially, with a .basta extension.

Ragnar Locker

Ragnar Locker ransomware and its operators have been targeting global infrastructure since December 2019.

  • Portuguese carriers

  • Israeli hospital

Utilizing Remote Desktop Protocol, the group exploited Windows to extort huge amounts of money.

Furthermore, threat actors also threaten victims with decryption tools and sensitive data release. Ragnar Locker is considered one of the most dangerous ransomwares due to the fact that it targets critical infrastructure.

Vice Society

The Vice Society is a Russian-speaking hacking group that began operating in 2021. This threat group specializes in ransomware attacks against the following sectors:-

  • Healthcare

  • Education

  • Manufacturing

Independently, they have approached Europe and the United States with a double extortion approach, demanding over $1 million during their initial ransom and agreeing to settle for around $460,000.

Besides exploiting internet-facing apps and compromised credentials, they also move laterally using SystemBC, PowerShell Empire, and Cobalt Strike.

Additionally, it exploits the Windows service, PrintNightmare, and evades detection by using disguised malware and process injection.

Greater Manchester’s Hottest Gigs with Liam Gallagher and More in 2024

Everest

Since December 2020, Everest has transitioned from data exfiltration to ransomware, and now it focuses on Initial Access Broker services.

Among the industries that the group targets are the Americas, capital goods, health, and the governmental sector. It is well known for attacking AT&T and South American government entities, as well as the following ransomware:-

  • EverBe 2.0

  • BlackByte

The group operates discreetly, and has managed to list nearly 100 organizations on its dark website. It acts as an Initial Access Broker, which is a shift from direct ransomware attacks.

BianLian

The BianLian ransomware first emerged in June 2022 and is written in the Go programming language. However, it exfiltrates data via the following channels:-

  • RDP

  • FTP

  • Rclone

  • Mega

Primarily it targets the following sectors:-

  • Financial institutions

  • Healthcare

  • Manufacturing

  • Education

  • Entertainment

  • Energy

They initially used encryption for ransom, but later introduced data exfiltration, threatening disclosure. In January 2023, Avast’s decryptor shifted its focus to data theft, terminating file encryption.

Through spearphishing, the malware connects to its command server, downloads tools, and secures a lasting hold on the system.

Eric Joseph Gomes
Eric Joseph Gomeshttps://www.eduvast.com/
Seasoned professional blog writer with a passion for delivering high-quality content that informs, educates, and engages readers.

Popular Articles

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active
PRIVACY POLICY
  1. General
  • (1.1.) Eduvast (“Eduvast”, “We”, “Our”, “Us”) is committed to the protection of personal information provided by the users (“You”,“Your”,“User”) to Eduvast. You agree that Your use of Eduvast implies Your consent to the collection, retention and use of Your personal information in accordance with the terms of this Privacy Policy (“Privacy Policy”).
  • (1.2.) We take the privacy of our Users seriously. We are committed to safeguarding the privacy of Users while providing personalized and valuable service.
  • (1.3.) While We do Our best to protect Your information, particularly with respect to the protection of Your personal data, Eduvast cannot ensure the security of Your data transmitted via the internet, telephone or any other networks.
  • (1.4.) Access to the contents available  is conditional upon Your acceptance of this Privacy Policy which should be read together with the End User License Agreement“EULA”.
  • (1.5.) If You do not agree to any of the provisions of this Privacy Policy or EULA, You should not download, install and use the App. We may revise, alter, add, amend or modify this Privacy Policy at any time by updating this privacy policy. By downloading, installing and/or using this App, You agree to be bound by any such alteration, amendment, addition or modification.
2. Information Collected Non Personal Information
  • (2.1.) We may collect non-personal information about You whenever You access or interact with Our Website or any of the related services. This includes but not limited to browser name, version, server location, device specific information such as the type of device used, users’ operating system and version, your mobile devices unique device ID, third party apps or App or service that referred users to App, language preference, means of connection to App, internet service providers, IP address, technical information, google advertising ID (GAID), IDFA, GAID Opt-out Status, location information, interaction of Your device with the App and applications, details of Your device including without limitation its manufacturer details, height and width of your device screen, model, version, UDID or IMEI Number and other similar information about You(collectively "Traffic Data”). Personal Information
  • (2.2.) 2.2. We may collect personal information that identifies You in a variety of ways, including, but not limited to the information submitted during download and installation of the App or in connection with registration for other activities or features offered through the App. Personally identifiable information collected may include name, mailing address, email address, phone number and demographic information such as gender, nationality, postcode and other personal information including but not limited to date, time or place of birth ("Personal Information"). If You communicate with Us by, for example, e-mail or letter, any information provided in such communication may be collected by Eduvast.
  • (2.3.) Our website may transmit your Personal Information to our internal servers. This Personal Information is immediately deleted once you delete the App, except to the extent it is necessary to store the same under applicable laws. Further, we have implemented commercially reasonable physical, managerial, operational and technical security measures to protect the loss, misuse and alteration and to preserve the security of the Personal Information in our care.Finally, this information is used strictly in line with our business purposes.
  • (2.4.) You understand that once You leave Our servers, use of any information You provide shall be governed by the privacy policy of the operator of the site used by You.
3. Disclosure of Personal Information
    • (3.1.) We do not disclose Your Personal Information to any third parties other than as may be required by us, Eduvast’s affiliates, partners, trusted business networks, in compliance with our Privacy Policy for the purpose of moderating the content of the Website, enhancing Your user experience, providing You localised content and to enable Us and Our partners to provide You with targeted information which may be of benefit to you.
    • (3.2.) To enhance customer experience and to provide focused support, we may share generic aggregated demographic information which may include Your information collected by Us but not linked to any personally identifiable information regarding visitors and users with Our business partners, trusted affiliates and advertisers for the purposes outlined above.
    • (3.3.) At times We are required by law or litigation to disclose personal information about the users. We may also disclose information about the user if We determine that disclosure of information is necessary for national security, law enforcement, or other issues of public importance.
    • (3.4.) We use Our best efforts to use information in aggregate form (so that no individual User is identified) for the following purposes:
(3.4.1) To build up marketing profiles; (3.4.2) To aid strategic development, data collection and business analytics; (3.4.3) To manage our relationship with advertisers and partners; (3.4.4) 3.4.4. To audit usage of Our website i.e. www.www.eduvast.com (3.4.5) 3.4.5. To enhance user experience in relation to the App and Our website (collectively, “Permitted Use”).
  • (3.5.) We reserve the right to disclose Personal Information if required to do so by law or if we believe that it is necessary to do so to protect and defend the rights, property or personal safety of Eduvast, the App, or Users.
4. Cookies
  • (4.1.) Whenever You access the App We may place "cookies" on Your hard drive for record-keeping purposes to enhance Your experience or sometimes to personalize Your experience. Cookies are small text files that are placed on Your device's hard drive by the App You visit. Cookies help Us to identify information relating Your activities and to retain information relating to Your preferences and history on the App.
  • (4.2.) Ad targeting cookies: We and/or Our service providers may use advertising cookies to deliver ads that are more relevant to You and Your interests.
  • (4.3.) You may choose to disable cookies by turning off cookie feature on the web browser. However, by disabling this feature, some parts of the App may not function properly. This may prevent You from taking full advantage of the App.
5. Confidentiality
    • (5.1.) Except as otherwise provided in this Privacy Policy, We will keep Your Personal Information private and will not share it with third parties, unless We believe in good faith that disclosure of Your Personal Information or any other information We collect about You is necessary for Permitted Use or to:
(5.1.1.) Comply with a court order or other legal process; (5.1.2.) Protect the rights, property or safety of Eduvast or another party; (5.1.3.) Enforce the Agreement, including EULA; or (5.1.4.) Respond to claims that any posting or other content violates the rights of third-parties. 6. Security
  • (6.1.) The security of Your Personal Information is important to Us. We follow generally accepted industry standards to protect the Personal Information submitted to Us, both during transmission and once We receive it.
  • (6.2.) Although We make best possible efforts to store Personal Information in a secure operating environment which is not open to the public, You should understand that there is no such thing as complete security, and We do not guarantee that there will be no unintended disclosures of Your Personal Information. If We become aware that Your Personal Information has been disclosed in a manner not in accordance with this Privacy Policy, We will use reasonable efforts to notify You of the nature and extent of such disclosure (to the extent We know that information) as soon as reasonably possible and as permitted by law.
7. Updates and Changes to Privacy Policy
  • We reserve the right, at any time, to add to, change, update, or modify this Privacy Policy so please review it frequently. In all cases, use of information We collect is subject to the Privacy Policy in effect at the time such information is collected. You hereby acknowledge and agree that it is Your responsibility to review this Privacy Policy periodically and become aware of the modifications. If You disagree to any of the changes to the Privacy Policy, You shall refrain from using or accessing the App. Your continued use of the App following the posting of the revised Policy shall indicate Your acceptance and acknowledgment of the changes and You will be bound by it.
8. Updates and Changes to Your Personal Information
  • You have a right to correct any errors in Your Personal Information available with Us. You may request Us in writing that We cease to use Your Personal Information.
9. Contact Us
  • You may write to us at [email protected] for any privacy concerns and requests relating to this EULA and Privacy Policy.
Save settings
Cookies settings