[Heads Up] DarkSide: Sophisticated New Customized Ransomware Strain Demands Millions Of Dollars

Breaking News: A new ransomware operation named DarkSide began attacking organizations earlier this month with customized attacks that have already earned them million-dollar payouts. But here is the clincher: When performing attacks, DarkSide will create a customized ransomware executable for the specific company they are attacking.

Darkside of the Moon

Our friends at Bleepingcomputer said: “Starting around August 10th, 2020, the new ransomware operation began performing targeted attacks against numerous companies. After not finding a “product” that suited their needs, they decided to launch their own operation.

DarkSide stated: “We are a new product on the market, but that does not mean that we have no experience and we came from nowhere.  We received millions of dollars profit by partnering with other well-known cryptolockers.
We created DarkSide because we didn’t find the perfect product for us. Now we have it.”

DarkSide states that they only target companies that can pay the specified ransom as they do not “want to kill your business.”The threat actors have also stated that they do not target the following types of organizations.

It is too soon to tell if they will honor this statement. From victims seen by BleepingComputer, DarkSide’s ransom demands range from $200,000 to $2,000,000. These numbers can likely be more or less depending on the victim.  At least one of the victims seen by BleepingComputer appears to have paid a million+ dollar ransom.

DarkSide Steals Data Before Encrypting Victims

Like other human-operated ransomware attacks, when the DarkSide operators breach a network, they will spread laterally throughout a network until they gain access to an administrator account and the Windows domain controller. While they spread laterally, the attackers will harvest unencrypted data from the victim’s servers and upload it to their own devices.

This stolen data is then posted to a data leak site under their control and used as part of the extortion attempt. When data is posted to the leak site, the threat actors will list the company name, the date they were breached, how much data was stolen, screenshots of the data, and the types of stolen data.

Extortion Strategy Designed To Scare Even If You Have Backups

DarkSide states that if a victim does not pay, they will publish all of the data on their website for at least six months. This extortion strategy is designed to scare a victim into paying the ransom even if they can recover from backups. If a victim pays the ransom, DarkSide states that they will remove the stolen data from their leak site. For the victim that had paid the ransom, their data has already been removed from the site.

Hacker Ransom Demands

Customized Ransomware Attacks

When performing attacks, DarkSide will create a customized ransomware executable for the specific company they are attacking. When executed, the ransomware will execute a PowerShell command that deletes Shadow Volume Copies on the system so that they cannot be used to restore files.

According to Advanced Intel’s Vitali Kremez, it then proceeds to terminate various database, office applications, and mail clients to prepare the machine for encryption. When encrypting a computer, DarkSide will avoid terminating certain processes.

Specifically avoiding TeamViewer is not common, if ever seen with ransomware, and could indicate that the threat actors are using it for remote access to computers. Michael Gillespie, who analyzed the encryption process, told BleepingComputer that the ransomware utilizes a SALSA20 key to encrypt files. This key is then encrypted with a public RSA-1024 key included in the executable

Each victim will also have a custom extension created using a custom checksum of the victim’s MAC address. Each executable is customized to include personalized “Welcome to Dark” ransom note, which will include the amount of data that was stolen, the type of data, and a link to their data on the data leak site. At this time, the ransomware looks unbreakable, and there is no way to recover files for free.  

Possible connection to REvil – Does Not Infect Eastern Europe Countries

When analyzing DarkSide, it was discovered that it has some similarities with the REvil ransomware. The most obvious similarity is the ransom note, which uses almost the same template, as shown in the REvil ransom note below. In BleepingComputer’s behavioral analysis of DarkSide, we noticed that it would execute an encoded PowerShell script when first executed. Finally, MalwareHunterTeam found that DarkSide purposely avoids infecting victims in CIS countries. The code to do this is similar to what is used in REvil and also GandCrab. Here is an example victim.

It’s not known yet how these bad guys get in, but you can count on them using phishing as one of their attack vectors. Step those users through new-school security awareness training! Full Story at Bleepingcomputer


President, Transportation Company

Your technical support team has always been able to handle our needs quickly, efficiently, and patiently. We appreciate your timeliness and the hours you have saved us. It is great to know that we have people at IT360 capable to provide solutions to our problems.

President, Transportation Company

Technology News

IT 360 News
Elevate Your Communication with IT360’s Advanced Phone Solutions

Unleash the Power of Seamless Connectivity Welcome to IT360, where cutting-edge technology meets unparalleled communication efficiency. Our advanced phone systems are expertly designed to cater to the diverse needs of modern businesses, ensuring you stay connected in today’s fast-paced world. Transform your business’s communication infrastructure into a robust, adaptable, and scalable network with our solutions, […]

Read more
IT 360 News
Integrating AI into Your Daily Work: A Practical Guide

Introduction Artificial Intelligence (AI) is revolutionizing the workplace, offering tools to enhance productivity, creativity, and decision-making. Starting with AI in your everyday work doesn’t require extensive technical knowledge. This guide provides practical steps and examples to seamlessly integrate AI into your work routine, focusing on the accessible platform Getting Started with AI Practical Uses […]

Read more