DoppelPaymer ransomware supsects arrested in Germany and Ukraine
You’ve
almost
certainly
heard
of
the
ransomware
family
known
as
DoppelPaymer,
if
only
because
the
name
itself
is
a
reminder
of
the
double-barrelled
blackmail
technique
used
by
many
contemporary
ransomware
gangs.
To
increase
the
pressure
on
you
to
pay
up,
so-called
double-extortionists
not
only
scramble
all
your
data
files
so
your
business
stops
running,
but
also
steal
copies
of
those
files
to
use
as
extra
leverage.
The
idea
is
that
if
you
pay
up
for
the
decryption
key
to
unlock
your
files
and
get
your
business
back
on
the
road,
the
attackers
will
very
generously
also
agree
to
delete
the
files
they’ve
stolen
(or
so
they
say),
rather
than
leaking
those
files
to
the
media,
revealing
them
the
regulator,
or
selling
them
on
to
other
cybercriminals.
Crudely
put,
the
blackmailers
are
inviting
you
to
pay
for
them
both
for
a
positive
action
(handing
over
the
decryption
keys),
and
for
a
negative
one
(not
leaking
the
stolen
data).
Also,
rather
obviously,
the
crooks
are
hoping
that
even
if
you
have
reliable
backups
and
could
get
your
business
moving
again
on
your
own,
without
paying
for
the
decryption
keys…
…
then
they
may
nevertheless
be
able
to
blackmail
you
into
handing
over
their
menaces-money
anyway,
by
promising
to
keep
their
mouths
shut
about
the
fact
that
you
suffered
a
data
breach.
Usually,
double-extortion
attackers
steal
your
files
in
their
unencrypted
form
before
garbling
them.
But
they
could
just
as
well
steal
them
during
or
after
the
scrambling
process,
given
that
they
already
know
the
decryption
keys.
Naming-and-shaming
DoppelPaymer,
along
with
many
other
cybergangs
of
this
sort,
ran
their
own
online
“name-and-shame”
website,
as
noted
in
a
recent
press
release
from
Europol:
The
criminal
group
behind
this
ransomware
relied
on
a
double
extortion
scheme,
using
a
leak
website
launched
by
the
criminal
actors
in
early
2020.
German
authorities
are
aware
of
37
victims
of
this
ransomware
group,
all
of
them
companies.
One
of
the
most
serious
attacks
was
perpetrated
against
the
University
Hospital
in
Düsseldorf.
In
the
US,
victims
paid
at
least
€40,000,000
between
May
2019
and
March
2021.
That’s
the
bad
news.
The
good
news,
if
you
can
call
it
that,
is
the
reason
why
Europol
is
writing
about
the
DoppelPaymer
ransomware
right
now.
A
combined
operation
involving
German,
Ukrainian
and
US
law
enforcement
has
just
resulted
in
the
interrogation
and
arrest
of
suspects
in
Germany
and
Ukraine,
and
the
seizure
of
electronic
devices
in
Ukraine
for
forensic
analysis.
Europol
didn’t
publish
any
pictures
of
the
equipment
seized
in
this
case,
but
we’re
assuming
that
laptops
and
mobile
phones,
perhaps
along
with
vehicles
(which
are
effectively
multi-purpose
online
computing
networks
in
their
own
right
these
days),
were
taken
away
for
examination.
Servers
may
still
be
running
The
press
release
didn’t
mention
whether
the
investigators
were
able
to
seize
or
shut
down
any
servers
connected
with
this
ransomware
gang.
These
days,
whether
they’re
operated
by
legitimate
businesses
or
criminals,
servers
tend
to
run
somewhere
in
the
cloud,
which
quite
literally
means
“on
someone
else’s
computer”,
which
almost
always
also
means
“somewhere
else,
perhaps
even
in
another
country”.
Unfortunately,
with
careful
use
of
dark
web
anonymity
tools
and
cautious
operational
security,
criminals
can
obscure
the
physical
location
of
the
servers
they’re
using.
Those
servers
could
include
the
websites
where
they
publish
their
name-and-shame
data,
the
databases
where
they
record
the
decryption
keys
of
current
victims
and
whether
they’ve
paid,
or
the
“business
network”
servers
where
they
sign
up
affiliates
to
help
them
mount
their
attacks.
So,
even
if
the
cops
arrest
some,
many
or
all
the
members
of
a
ransomware
gang,
that
doesn’t
always
stop
the
ransomware
activities,
because
their
infrastructure
remains,
and
can
still
be
used
by
other
gang
members
or
taken
over
by
rivals
to
continue
the
extortion
activities.
Likewise,
if
the
cops
manage
to
take
down
and
seize
servers
that
are
vital
to
a
ransomware
gang,
the
same
dark
web
anonymity
that
makes
it
hard
to
trace
forwards
from
arrested
users
to
their
servers…
…also
makes
it
hard
to
trace
backwards
from
seized
servers
to
identify
and
arrest
the
users.
Unless
the
crooks
have
made
technical
or
operational
blunders,
of
course,
such
as
once-in-a-while
making
direct
connections
to
their
servers
by
mistake
instead
of
going
through
an
anonymising
service
such
as
TOR
(the
Onion
router),
or
relying
on
other
operators
in
the
cybercrime
scene
not
to
rat
them
out
by
accident
or
on
purpose.
LEARN
MORE
ABOUT
HOW
DARK
WEB
CROOKS
GET
CAUGHT
We
talk
to
renowned
cybersecurity
author
Andy
Greenberg
about
his
excellent
book,
Tracers
in
the
Dark:
The
Global
Hunt
for
the
Crime
Lords
of
Cryptocurrency.
No
audio
player
below?
Listen
directly
on
Soundcloud.
Prefer
reading
to
listening?
Full
transcript
available.
What
to
do?
-
Don’t
dial
back
your
protection.
As
welcome
as
these
arrests
are,
and
as
useful
as
the
seized
devices
are
likely
to
be
in
helping
the
cops
to
identify
yet
more
suspects,
this
bust
on
its
own
is
unlikely
to
make
a
significant
dent
in
the
ransomware
scene
as
a
whole.
Indeed,
in
this
very
case,
Europol
itself
warns
that
“according
to
reports,
DoppelPaymer
has
since
rebranded
[as
a
ransomware
gang
called]
‘Grief’.” -
Don’t
fixate
on
ransomware
alone.
Remember
that
ransomware
attacks
are
sometimes,
perhaps
often,
the
tail-end
of
an
extended
attack,
or
even
multiple
attacks,
involving
criminals
roaming
freely
through
your
network.
Crooks
who
can
steal
data
from
computers
all
over
your
business,
and
who
can
scramble
almost
any
files
they
want
on
almost
as
many
laptops
and
servers
they
like,
can
(and
often
do)
carry
out
almost
any
other
sort
of
sysadmin-level
attack
they
want
while
they’re
in.
Unsurprisingly,
this
rogue
“sysadmin”
activity
often
includes
quietly
opening
up
holes
to
let
the
same
crooks,
or
someone
else,
back
in
later. -
Don’t
wait
for
threat
alerts
to
drop
into
your
dashboard.
In
double-extortion
ransomware
attacks,
for
example,
the
data-stealing
stage,
where
the
crooks
are
plundering
your
files
before
scrambling
them,
is
a
handy
warning
that
an
attack
is
actively
under
way.
But
with
a
good
threat
hunting
team,
whether
in-house
or
brought
in
as
a
service,
you
can
aim
to
detect
signs
of
attack
even
earlier
than
that,
ideally
even
before
the
attackers
get
their
initial
beachhead
from
which
they
hope
to
attack
your
whole
network. -
Don’t
pay
up
if
you
can
possibly
avoid
it.
We’ve
always
said,
“We’re
not
going
to
judge
you
if
you
do,”
because
we’re
not
the
ones
whose
business
has
just
been
derailed.
But
paying
up
not
only
funds
the
next
wave
of
cybercrime,
but
also
may
not
even
work
at
all.
Colonial
Pipeline
infamously
spent
over
$4
million
on
a
decryption
tool
that
turned
out
to
be
useless,
and
the
Dutch
Police
recently
warned
of
a
cyberextortion
gang
who
allegedly
made
millions
“selling
their
silence”,
only
for
the
stolen
data
to
be
leaked
anyway.
LEARN
MORE
ABOUT
XDR
AND
MDR
Short
of
time
or
expertise
to
take
care
of
cybersecurity
threat
response?
Worried
that
cybersecurity
will
end
up
distracting
you
from
all
the
other
things
you
need
to
do?
Take
a
look
at
Sophos
Managed
Detection
and
Response:
24/7
threat
hunting,
detection,
and
response ▶
LEARN
MORE
ABOUT
ACTIVE
ADVERSARIES
Read
our
Active
Adversary
Playbook.
This
is
a
fascinating
study
of
144
real-life
attacks
by
Sophos
Field
CTO
John
Shier.