Security Flaws in Ransomware Sites Helped Six Companies Avoid Paying Ransom

The fight against ransomware, a type of cyberattack in which an organization's data is encrypted and a ransom is demanded for its release, has intensified in recent years. Ransomware criminals have refined their tactics, creating a significant threat to businesses and organizations worldwide.

However, recent research has uncovered an unexpected twist in this ransomware battle.

Thanks to security flaws in the web infrastructure used by ransomware gangs, six companies were spared from having to pay high ransoms. These security vulnerabilities in the data leak sites of the attackers played a crucial role in allowing the victims to recover their data without paying any ransom.

This article by ITD Consulting explores how these flaws in ransomware systems allowed victims to recover their data and what implications this has for the future of cybersecurity.

Vangelis Stykas' Study: Uncovering Critical Ransomware Flaws

The Research Project

Vangelis Stykas, a prominent security researcher and CTO of Atropos.ai, embarked on an ambitious research project aimed at tracking and analyzing the command-and-control servers used by over 100 ransomware and extortion groups.

This work required an in-depth understanding of the techniques and tools employed by these ransomware groups, as well as the ability to identify and exploit weaknesses in their systems.

Stykas set out to unravel the complex ecosystem of cybercrime, focusing on the technological infrastructures that allow ransomware gangs to carry out their operations covertly.

Fallos en la seguridad de sitios de ransomware ayudaron a que seis empresas no pagaran rescate, ITD Consulting, innovación tecnológica, análisis, ciberataque, ciberseguridad, ransomware, información

Stykas' main goal was to uncover vulnerabilities in the infrastructure of ransomware groups, which could not only reveal details about their internal operations but also expose critical information about their victims.

In his research, Stykas focused particularly on the web control panels used by ransomware gangs to manage their criminal activities. These panels, which allow cybercriminals to oversee their ransomware campaigns, represented a valuable window to identify weaknesses that could be exploited to dismantle their operations.

Through meticulous analysis, Stykas was able to find and document significant security flaws in these control panels, which provided access to crucial information about how the ransomware gangs operated and how they could be neutralized.

The research not only offered a detailed look into the techniques of ransomware cybercriminals but also provided a path for potential victims to receive assistance before the attacks could cause harm.

This innovative approach highlighted the importance of understanding the technological infrastructure behind ransomware in order to better protect organizations and mitigate the impact of cyberattacks.

Discovered Vulnerabilities

During his study, Stykas identified several security flaws in the web control panels of at least three ransomware groups. These ransomware vulnerabilities were enough to compromise the internal operations of the gangs.

Among the issues found were default passwords, exposed file directories, and vulnerable API endpoints. These flaws allowed Stykas to access critical information without needing authentication.

Success Stories: Data Recovery and Damage Prevention

Obtaining Decryption Keys

Thanks to the discovered security flaws, Stykas was able to obtain decryption keys for two companies at risk of paying large ransoms.

These keys allowed the companies to recover their encrypted data without the need to negotiate with the ransomware criminals. This kind of success is remarkable in the cybersecurity and ransomware field, where victims are often forced to pay large sums to regain access to their information.

Early Warnings to Cryptocurrency Companies

In four additional cases, Stykas alerted cryptocurrency companies that were about to be attacked by ransomware. These companies received warnings before the ransomware could start encrypting their files, allowing them to take preventive measures and avoid significant damage.

Among the alerted companies were two considered unicorns, valued at over one billion dollars, that were targeted by ransomware.

Fallos en la seguridad de sitios de ransomware ayudaron a que seis empresas no pagaran rescate, ITD Consulting, innovación tecnológica, análisis, ciberataque, ciberseguridad, ransomware, rescate

Analysis of the Vulnerabilities Found

Use of Default Passwords

One of the most serious flaws identified by Stykas was the use of default passwords by the ransomware group Everest to access their SQL databases.

This practice compromised the security of their data and exposed file directories and other critical details of this ransomware group. The use of default passwords is a basic security flaw that allowed Stykas to access internal information that would normally be protected.

Exposed API Endpoints

Another significant vulnerability was the exposure of API endpoints by the BlackCat ransomware gang. These endpoints revealed information about the targets of their ongoing ransomware attacks, providing valuable data about operations in progress.

The exposure of this information facilitated the identification of the victims of this ransomware and allowed for a quicker response to mitigate the impact of the attack.

Insecure Direct Object Reference (IDOR) Vulnerability

Stykas also exploited a vulnerability known as Insecure Direct Object Reference (IDOR) to access the chat messages of an administrator from the Mallox ransomware gang.

This ransomware flaw allowed him to obtain two decryption keys, which he later shared with the affected companies. IDOR is a type of security vulnerability that allows ransomware attackers to access resources they shouldn’t have access to, and in this case, it proved to be a valuable tool in helping the victims.

Implications for Cybersecurity and Law Enforcement’s Role

Vulnerabilities in Ransomware Operations

Stykas’ findings demonstrate that, despite the sophistication of ransomware gangs, they can still be vulnerable to basic security errors. These ransomware flaws not only affect the effectiveness of the attacks but also provide opportunities for cybersecurity authorities to intervene.

The exposure of internal information from ransomware groups can be used to track their operations and dismantle their networks.

The Role of Law Enforcement

Government agencies, such as the FBI, have long promoted the idea of not paying ransoms to ransomware criminals, hoping this will prevent attackers from benefiting from their crimes.

However, implementing this policy can be difficult for businesses that need to regain access to their data locked by ransomware. The results of Stykas’ research show that law enforcement can leverage security vulnerabilities in ransomware to obtain decryption keys and prevent further attacks.

New Strategies in the Fight Against Ransomware

Exploiting Vulnerabilities

Stykas’ research underscores the importance of exploring and exploiting vulnerabilities in the infrastructures used by ransomware gangs. Identifying and exploiting these flaws can enhance the ability to protect businesses and reduce the impact of ransomware attacks.

This approach could complement traditional law enforcement efforts and offer new strategies for defending against ransomware cybercrime.

Improvement in Security Practices

Moreover, the findings emphasize the need for ransomware gangs to implement better security practices in their operations. Although these ransomware organizations operate within the realm of cybercrime, their security flaws reveal that even criminals can fall victim to basic errors.

Improving the security of their ransomware systems could reduce the effectiveness of interventions by researchers and authorities.

Fallos en la seguridad de sitios de ransomware ayudaron a que seis empresas no pagaran rescate, ITD Consulting, innovación tecnológica, análisis, ciberataque, ciberseguridad, ransomware, fallos

Vangelis Stykas' study highlights how security flaws in ransomware websites can be unexpectedly used to protect companies from having to pay high ransoms and minimize the damage caused by cyberattacks.

By identifying and exploiting vulnerabilities in the infrastructure of ransomware gangs, Stykas not only allowed six companies to recover their data without paying the criminals, but also provided valuable insight on how to strengthen defenses against future attacks.

These findings emphasize the importance of ongoing research in identifying weaknesses in ransomware systems. As threats evolve and attack methods become more sophisticated, the ability to discover and understand these vulnerabilities becomes a crucial tool for mitigating the impact of attacks, such as ransomware.

The lessons learned from these incidents can help organizations improve their cybersecurity strategies and better prepare to face similar challenges in the future. With this research, ransomware becomes just another threat that can be better addressed.

Collaboration between security researchers and authorities is essential to develop new strategies for prevention and response to ransomware attacks. By working together, innovative approaches to combating ransomware cybercrime can emerge, protecting not only individual businesses but also society as a whole.

Continuous monitoring and analysis of vulnerabilities in ransomware infrastructure will remain essential to maintaining security in an increasingly complex digital environment. . If you want your company to stay secure from threats like ransomware, write to us at [email protected]. We offer scalable cybersecurity solutions to keep your company always protected.

Do you want to SAVE?
Switch to us!

✔️ Corporate Email M365. 50GB per user
✔️ 1 TB of cloud space per user

en_USEN

¿Quieres AHORRAR? ¡Cámbiate con nosotros!

🤩 🗣 ¡Cámbiate con nosotros y ahorra!

Si aún no trabajas con Microsoft 365, comienza o MIGRA desde Gsuite, Cpanel, otros, tendrás 50% descuento: 

✔️Correo Corporativo M365. 50gb por usuario.

✔️ 1 TB of cloud space per user 

✔️Respaldo documentos.

Ventajas: – Trabajar en colaboración Teams sobre el mismo archivo de Office Online en tiempo real y muchas otras ventajas.

¡Compártenos tus datos de contacto y nos comunicaremos contigo!