Nephilim: Regarding cyber attacks and computer hacking, it is clear that no one is safe and that anyone can have their computer, cell phone, etc. hacked, without having anything to do with rich or poor, worker or count. But there are criminals who prefer to attack on a large scale and go for the most juicy loot, such as those who Nephilim ransomware group.
Ransomware, the malware par excellence
Ransomware is a type of cyber threat that infects a computer or a network in order to encrypt it and steal the information it contains, and its release requires payment, usually in a cryptocurrency. But modern attacks are selective, adaptive, and stealth, using approaches already tested and refined by Advanced Persistent Threat (APT) groups.
According to a report by cybersecurity experts at Trend Micro, modern ransomware actors identify and target valuable data, often from the victim’s network organization rather than simply encrypting it. This gives them another opportunity for extortion: if the victim does not pay the ransom, the attacker can threaten to disclose the private information. And for companies that have intellectual property data, proprietary information, employee private data, and customer data, this is a serious concern.
Because in his industry, “any data breach will lead to legal sanctions, lawsuits and reputational damage.”
The double extortion
This tactic is the so-called ‘double extortion’, through which they threaten to filter the sensitive data that has been stolen before deploying the ‘ransomware’ in their compromised networks, as reported by Trend Micro in the results of its research into ‘ransomware’ modern technology. , the techniques they use and the type of organizations they target. According to the report, the attack is usually no longer the work of one person/group: there are different groups of cyber criminals who are responsible for the different phases of the attacks.
“This is the byproduct of a recent evolution in cybercriminals’ business practices: hackers are now partnering with ransomware actors to monetize hack-related breaches,” they explain.
Trend Micro has focused on 16 groups of modern “malware” analyzed between March 2020 and January 2021, of which Conti, Doppelpaymer, Egregor and REvil led the number of victims exposed, and Cl0p had stolen the most data. Hosted ‘online’, with 5 TB.