Malware & RansomwareHIGH

Ransomware - New Service Promises to Monetize Stolen Data

Featured image for Ransomware - New Service Promises to Monetize Stolen Data
TRThe Record
Leak Bazaarransomwaredata processingcybercrimeextortion
🎯

Basically, a new service wants to sell stolen data from ransomware attacks.

Quick Summary

A new service called Leak Bazaar aims to monetize stolen data from ransomware attacks. This could lead to increased threats and exploitation of personal data. Experts are watching closely as this model unfolds.

What Happened

A new cybercrime service called Leak Bazaar is emerging, promising to monetize data stolen by ransomware gangs. This service is not just another hacking tool; it’s positioning itself as a data-processing business. Advertisements for Leak Bazaar are appearing across various dark web forums, enticing potential customers and affiliates. The service aims to transform vast, disorganized datasets from cyberattacks into structured, searchable intelligence that can be sold or used for extortion.

Tammy Harper, a researcher at cybersecurity firm Flare, describes Leak Bazaar as an e-discovery service for stolen data. This concept raises alarms among law enforcement and cybersecurity experts, who are already grappling with the complexities of the ransomware ecosystem. Traditionally, attackers steal large amounts of sensitive information but often leave much of it unutilized, using it only as leverage for extortion.

Who's Being Targeted

Leak Bazaar’s model suggests that cybercriminals are looking to capitalize on the vast amounts of unexploited data they possess. The service could allow attackers to exert more pressure on companies to pay ransoms, facilitate follow-on crimes like fraud, and enable direct extortion of individuals by threatening to release sensitive information. This direct approach has been discussed among experts but rarely seen at scale until now.

Will Lyne, head of economic and cybercrime at London’s Metropolitan Police Service, emphasizes the potential dangers of structured datasets. They could make it easier for criminals to conduct targeted phishing or fraud, increasing the overall threat landscape significantly.

Tactics & Techniques

The emergence of Leak Bazaar reflects broader shifts in the ransomware ecosystem. As law enforcement pressures disrupt major groups, new actors are experimenting with ways to monetize stolen data. Harper notes that these services are attempting to filter and package stolen data, making it more relevant and increasing its potential value.

However, experts caution that the actual exploitation of personal data may not be as lucrative as anticipated. Jamie MacColl, a researcher at the Royal United Services Institute, argues that attackers are generally more interested in corporate data that can yield higher returns through extortion. The current operational model favors volume over depth, targeting numerous victims rather than analyzing individual datasets.

Defensive Measures

While the concept of monetizing stolen data through services like Leak Bazaar is intriguing, it remains largely unproven. Experts believe that unless current methods of making money in cybercrime begin to fail, criminals are unlikely to invest time and resources into processing stolen data. The infrastructure and effort required to analyze and extract value from these datasets are significant barriers.

For now, the cybercrime landscape is in a state of experimentation. Harper points out that the true test of Leak Bazaar will come when it successfully demonstrates its ability to process data and yield meaningful returns. Until then, the potential risks associated with this new service serve as a reminder for organizations and individuals to remain vigilant against evolving ransomware threats.

🔒 Pro insight: The emergence of Leak Bazaar indicates a potential shift in ransomware tactics, emphasizing the need for enhanced data protection measures.

Original article from

TRThe Record
Read Full Article

Related Pings

HIGHMalware & Ransomware

Axios Supply Chain Attack - Malicious Packages Discovered

A supply chain attack on Axios has led to malicious npm packages being distributed. Developers may have unknowingly installed a Remote Access Trojan. It's crucial to assess and secure your development environments to prevent exploitation.

Malwarebytes Labs·
HIGHMalware & Ransomware

Venom Stealer - Continuous Credential Harvesting Threatens Users

Venom Stealer is a new malware that continuously steals credentials and cryptocurrency. Its advanced tactics pose a serious risk to users. Understanding its methods is vital for safeguarding sensitive data.

SecurityWeek·
HIGHMalware & Ransomware

WhatsApp Malware - Campaign Delivers VBS Payloads and MSI Backdoors

A new malware campaign exploits WhatsApp to deliver harmful VBS scripts. This attack targets users and organizations, compromising systems and maintaining access. Stay vigilant and protect your devices.

Microsoft Security Blog·
HIGHMalware & Ransomware

EtherHiding - Covert Malware Threat in Developer Toolchain

A new malware campaign, EtherHiding, targets developers by hiding malicious code in their tools. This stealthy threat risks sensitive data and system integrity. Stay alert and secure your coding environment against these attacks.

Canadian Cyber Centre News·
HIGHMalware & Ransomware

Malware - Backdoored LiteLLM Package Exposed by Trivy

A backdoored LiteLLM Python package was published by TeamPCP after compromising PyPI credentials via Trivy. Millions of users could be affected. It's crucial to check your installations and stay updated.

Snyk Blog·
HIGHMalware & Ransomware

Malware - Axios npm Supply Chain Attack Unleashes RAT

A major supply chain attack on the Axios npm package has introduced a remote access trojan. Millions of users are at risk, prompting urgent security measures. Check your systems for malicious updates and take immediate action.

SC Media·