Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
In recent years, ransomware groups have been evolving their tactics and moving away from the traditional strategy of encrypting victims’ data and demanding ransom for decryption keys. Instead, many ransomware groups are now shifting their focus towards data extortion.
This shift represents a significant departure from their previous methodology and poses a more significant threat to businesses and individuals. Rather than merely locking access to data, ransomware gangs are now exfiltrating sensitive information before encrypting it, leveraging the fear of data exposure to exert pressure on victims. It's important to note that threat actors still demand a ransom; however, their primary focus has shifted away from encrypting data. Let's examine ransomware groups that have shifted their focus towards data extortion and explore the reasons behind this strategic change.
When ransomware groups skip the encryption process and go straight for exfiltrating data and holding it ransom, it's called data extortion. In the past, Avertium discussed data extortion in published Threat Intelligence Reports; however, some may still be unclear on how it works. Lately, ransomware groups like Karakurt have been bypassing encryption and focusing on stealing data instead.
The threat actors do this by infiltrating a company's network and stealing valuable data, such as customer information, intellectual property, or confidential emails. Instead of solely locking access to the data through encryption, the threat actors threaten to expose the stolen information to the public or sell it on the dark web if their demanded ransom is not paid.
The threat of data exposure multiplies the pressure for victims. Ransomware groups understand that the potential consequences of data leaks, such as reputational damage, regulatory fines, and legal liabilities, far outweigh the cost of the ransom. Some ransomware groups (such as 8Base) employ a double-extortion strategy, demanding payment for both the decryption key and the assurance that stolen data won't be exposed. This approach maximizes their chances of receiving a ransom payment.
One of the most recent ransomware group’s moving towards data extortion is 8Base. This group evaded detection for over a year before resurfacing with an alarming surge in operations during May and June 2023. 8Base has been in operation since 2022 and has targeted more than 67 entities, with a focus on the manufacturing, construction, and business services sectors in the U.S. and in Brazil.
In June 2023, 8Base's methods took a more aggressive turn, using a double extortion strategy to compel victims to meet their ransom demands. Although potentially associated with the notorious RansomHouse group, the origins of 8Base remain shrouded in uncertainty. Nevertheless, their effective operations and preference for targeting smaller businesses give rise to significant cybersecurity concerns.
8Base's most recent attack targeted the Canadian provincial government entity, Alberta Dental Service Corp. Despite the dental organization having backups and the ability to restore services, the data of 1.47 million individuals, including personal banking information, was compromised. Alberta Dental Service Corp. ultimately paid the group's undisclosed ransom demand, and in response, 8Base provided evidence that the stolen data had been deleted. Nevertheless, like all cybercriminal groups, an organization can never be absolutely certain that all the stolen data was deleted and will not be leaked.
Emerging in August 2022, BianLian became known as a ransomware strain capable of swiftly encrypting files. The name BianLian draws inspiration from an ancient Chinese theatrical art form where performers, adorned in vibrant costumes and masks, would deftly change their masks' faces with a mere flick of a fan, almost in the blink of an eye.
Written in Golang and compiled as a 64-bit Windows executable, BianLian wreaked havoc across various sectors, including media and entertainment, manufacturing, and healthcare, during 2022 and 2023. On March 13, 2023, BianLian's extortion website listed 118 organizations as victims, with the majority (71%) hailing from the U.S.
At its peak, BianLian employed techniques to thwart analysis, such as triggering API calls capable of crashing sandboxes or automated analysis systems. Its objective was to encrypt all accessible drives on infected devices, and once the encryption process concluded, it erased itself. They made sure to encrypt systems, steal data, then threaten to publish the data. The ransomware met with considerable success until a team of researchers and analysts at Avast developed a decryptor for BianLian and made it publicly accessible. Now, the group has gone from being known as ransomware group that focuses on swift encryption, to both a ransomware and data extortion group.
BianLian switched to extortion-based data theft without encrypting systems in 2023. In May 2023, the Cybersecurity and Infrastructure Security Agency (CISA), in addition to government agencies in the U.S. and Australia, published a warning for organizations to remain vigilant regarding the threat actor and their new tactics.
In BianLian’s latest attack, the group targeted one of the world's oldest and largest charities, NGO Save the Children, stealing nearly 7TB of data including financial, human resources, personal, and medical information. Fortunately, the charity encountered no operational disruptions and maintained its usual functionality.
In June 2022, CISA issued a warning concerning a ransomware group known as Karakurt. The threat actor, also recognized as Karakurt Team and Karakurt Lair, was labeled as "new" by most media outlets, but, in reality, Karakurt had been active since 2021.
Karakurt uses a range of tactics, techniques, and procedures that pose challenges for defense and mitigation efforts. Notably, they bypass the encryption step on compromised devices and files, opting instead to immediately extract data and withhold it until receiving their ransom payment. To date, the group has victimized organizations in both North America and Europe and has publicly disclosed several press releases or announcements to shame non-cooperating victims.
Karakurt generally targets organizations that have already experienced a security breach, acquiring data either through a third-party intrusion broker or stolen login credentials. Once in possession of this data, they threaten to release the data on the dark web. Non-compliant victims face public exposure as the group discloses sensitive information.
In December 2021, Karakurt claimed they stole data from 40 victims, spanning the period between September and November 2021. The identities of these victims remain undisclosed. Karakurt makes promises to erase the stolen data upon payment, however some victims have reported that the threat actors failed to honor this commitment.
Karakurt’s most recent victim was the McAlester Regional Health Center in Oklahoma. The group stole over 126GB of data, including 40 GB of DNA patient records. If negotiations were refused or if the health center did not pay the undisclosed demanded ransom, the group threatened to auction off the DNA patient records to the highest bidder on the dark web.
Stolen genetic material can be exploited for malicious intentions, such as blackmail or generating false paternity outcomes. Additionally, it can expose predispositions to diseases and preexisting medical conditions, which may impact employment opportunities, insurance costs, and even lead to societal discrimination, as highlighted in a DNA theft study published in Nature Reviews Genetics.
According to Cyber News, after breaching the organization, Karakurt responded with the following statements on their data leak site:
“Another medical center doesn't care about their patients' data,” Karakurt said about the hospital.
“126GB of this organization data includes medical information, personal documents, financial and accounting data and lots of HR documentation,” the group stated.
“40GB of DNA tests of patients is a bonus! Stay tuned,” it said.
Although Karakurt threatened to publish the stolen data by August 1, 2023, there is no confirmation that the group followed through on their threat.
In June 2023, Cl0p exploited multiple MOVEit Transfer vulnerabilities, starting with CVE-2023-34362—an SQL injection vulnerability. This flaw allowed for escalated privileges and unauthorized access to victim systems. There were also several more MOVEit vulnerabilities discovered after the initial vulnerability. Despite prompt patches by Progress, Clop acted swiftly, compromising several companies in the following weeks.
The MOVEit Transfer vulnerabilities allowed Cl0p to steal data from U.S. banks, universities, hospitals, engineering firms, schools, and airlines. Once the data was stolen, Cl0p threatened to leak the data if ransom demands were not met. As a result of unmet demands, the sensitive information of millions of individuals was exposed on Cl0p’s data leak site.
Cl0P’s latest victim is the healthcare software company, Nuance Communications. Nuance uses Progress’s MOVEit software to transfer patient information. More than a dozen hospital systems, including UNC, DUKE, Atrium, and ECU, may have had personal data stolen by Cl0p.
Based on Cisco Talos's incident response data, instances of data theft and extortion without any data encryption or ransomware usage increased by 25% from April 1 to the close of June 2023. These cases constituted 30% of the incidents to which the organization responded. Ransomware remained the second most frequently encountered threat, representing 17% of the engagements. Cl0p’s exploitation of the MOVEit vulnerabilities accounted for many of those extortion incidents, with BianLian on their heels.
There are several reasons why threat actors are starting to pivot from encryption to data extortion:
In the realm of data extortion, maintaining backups remains crucial, but it won't provide sufficient protection against threat actors trying to compromise your organization's valuable data. An organization’s primary security focus should revolve around fortifying systems and networks against unauthorized access by threat actors.
It's essential to take an in-depth look data extortion groups like BianLian, Karakurt, and Cl0p, and understand why merely securing backups may not be the silver bullet needed to keep organizations safe. Of course, backups are still necessary, however, when confronting groups that threaten to leak sensitive, backups may offer limited reassurance.
Implementing an intrusion prevention system (IPS) is a cybersecurity best practice that will bolster your organization's overall security posture. An IPS is a network security tool designed to detect and thwart threats. It continually monitors the network for intrusion attempts and suspicious activities. When it identifies potential threats, it reports them to system administrators and employs various strategies to prevent attacks. These strategies may involve changing the security setup, halting the attack, or modifying the attack's content, all aimed at preventing successful attacks. Here are some actions the IPS takes when it detects a possible threat:
Some of the benefits of implementing an IPS strategy include:
8Base
Karakurt
Cl0p
8Base
Karakurt
BianLian
Cl0p
Canadian dental service pays ransom in 8base ransomware attack - SiliconANGLE
FBI confirms BianLian ransomware switch to extortion only attacks (bleepingcomputer.com)
BianLian ransomware gang holds Save the Children hostage | Computer Weekly
Hackers threaten to auction off DNA patient records | Cybernews
Clop ransomware gang starts extorting MOVEit data-theft victims (bleepingcomputer.com)
Karakurt ransomware group targeting healthcare providers, HHS warns | SC Media (scmagazine.com)
Cyber criminals pivot away from ransomware encryption | Computer Weekly
Cyber attack: NC hospitals data breach by Russian cyber gang | Charlotte Observer
The Double Extortion Group, 8Base (avertium.com)
Cyberattack may have stolen data from N.C. hospitals (spectrumlocalnews.com)
CrowdStrike: More Cybercriminals Ditching Ransomware To Focus On Data Extortion | CRN
Ransomware gangs ditch encryption, embrace data extortion (axios.com)
BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion (darkreading.com)
As Ransomware Gangs Shift To Data Extortion, Some Adopt A New Tactic: ‘Customer Service’ | CRN
An In-Depth Look at the Data Extortion Group, Karakurt (avertium.com)
Ransomware gangs move into pure extortion without encryption • The Register
BianLian ransomware gang holds Save the Children hostage | Computer Weekly
This document and its contents do not constitute, and are not a substitute for, legal advice. The outcome of a Security Risk Assessment should be utilized to ensure that diligent measures are taken to lower the risk of potential weaknesses be exploited to compromise data.
Although the Services and this report may provide data that Client can use in its compliance efforts, Client (not Avertium) is ultimately responsible for assessing and meeting Client's own compliance responsibilities. This report does not constitute a guarantee or assurance of Client's compliance with any law, regulation or standard.