Decrypting cybercriminals: Experts unveil secrets to infiltrate ransomware gangs!

December 23, 2023
1 min read

Four cybercrime sleuths from Singapore-based cybersecurity firm Group-IB have revealed how they infiltrate ransomware gangs in order to gather crucial information and mitigate further damage. The hackers are able to break into the cybercriminals’ ranks by conducting extensive research into the ransomware-as-a-service (RaaS) groups, including gathering intelligence on their operations, identifying contact information for the ransomware managers, and establishing communication through encrypted messengers. The researchers then undergo an interview process, in which they are quizzed on their experience with attacking organizations and their knowledge of the ransomware landscape. They must also demonstrate technical expertise and an understanding of the tools used in attacks. Once they pass the interview stage and gain the trust of the ransomware group, they are able to gather valuable information, such as the number of attacks, payment structures, and insights into how affiliates build custom ransomware payloads. However, the researchers are clear that they never engage in illegal activities, and their primary objective is to gather information to mitigate further damage. The information they gather during these infiltrations helps inform investigative activities and industry-wide mitigation efforts. The researchers emphasize the importance of operating within the confines of the law and not engaging in unlawful activities, as this would make them indistinguishable from cybercriminals themselves. Despite the inherent limitations of these infiltrations, Group-IB believes they are worth the outlay of resources as they provide valuable insights into the operations of ransomware groups and help protect customers against the threat of ransomware.

Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code