Extortion

The Netwalker ransomware operation has generated a total of $25 million in ransom payments since March 1st according to a new report by McAfee.

Netwalker is a Ransomware-as-a-Service (RaaS) operation that began operating in late 2019, where affiliates are enlisted to distribute the ransomware and infect victims in return for a 60-70% cut of ransom payments.

Known as a human-operated, or enterprise-targeting, ransomware, Netwalker affiliates will hack into an organization's network and quietly gain control.

Wiz
Netwalker ransom note
Netwalker ransom note

While gaining access to other workstations and servers, the threat actors will steal unencrypted files that are later used as leverage to get victims to pay.

Once they gain access to a network's Windows domain controller, they will deploy the ransomware to encrypt all of the devices on the network.

Building an advanced operation

When first starting, Netwalker infections were few and far between. Towards the end of April, something changed, and the operation pushed into high gear with a constant stream of new victims being reported on the ransomware identification site, ID Ransomware.

This increase in activity coincides with the Netwalker developers' recruitment drive on a Russian-speaking hacker forum where they stated they were looking for "experienced networkers with their own material."

Netwalker recruitment drive
Netwalker recruitment drive

To entice experienced hackers, Netwalker provided a screenshot showing partial bitcoin addresses with large ransom payments to illustrate the amount of money they could earn.

Netwalker ransom payments
Netwalker ransom payments

As part of their increased development, Netwalker also released an automated data leak site that allows affiliates to upload stolen data and schedule it for release at a specific date and time.

This site allows the affiliate to pressure the victim into paying the ransom with increasing anxiety as a timer counts down until the data is published.

Netwalker data leak site
Netwalker data leak site

Generated $25 million in 5 months

The recruitment drive and automated leak site must have paid off, as in a new report by McAfee, it was discovered that Netwalker generated $25 million in just five months.

After the Netwalker operator published the image of ransom payments, with the help of CipherTrace, McAfee was able to determine the full bitcoin addresses shown in the image and other associated addresses.

Related Netwalker bitcoin addresses
Related Netwalker bitcoin addresses

By following the transactions on these related bitcoin addresses, McAfee observed 2,795 bitcoins being transferred between related Netwalker wallets between March 1st, 2020, and July 27th,2020.

"The total amount of extorted bitcoin that has been uncovered by tracing transactions to these NetWalker related addresses is 2795 BTC between 1 March 2020 and 27 July 2020. By using historic bitcoin to USD exchange rates, we estimate a total of 25 million USD was extorted with these NetWalker related transactions," McAfee's report states.

This amount is not surprising considering the high-profile attacks that Netwalker has conducted this year:

Unfortunately, it has been all too common for organizations to pay the ransom as, in some cases, it is easier to pay a ransom then try to recover on their own.

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

US cybersecurity experts plead guilty to BlackCat ransomware attacks

University of Phoenix data breach impacts nearly 3.5 million individuals

Ukrainian hacker admits affiliate role in Nefilim ransomware gang

RansomHouse upgrades encryption with multi-layered data processing

Clop ransomware targets Gladinet CentreStack in data theft attacks