How law enforcement’s ransomware strategies are evolving
September 13, 2024
The year to date has been particularly eventful across the ransomware landscape, with prolific ransomware groups, including LockBit, seeing their operations seized and dismantled. The strategies used to take down these groups were meticulously planned and executed, successfully undermining the most accomplished cybercriminal experts.
The fight against ransomware has for years felt like an uphill battle. Each takedown faces the inevitable criticism that these actions are temporary, resulting in groups reforming and coming back.
However, the past year has seen some of history’s biggest takedowns, with international collaborative efforts from law enforcement employing new tactics. Are we seeing the balance of power beginning to shift?
The Development of Law Enforcement’s Strategy
Law-enforcement agencies have had to change their approach to remain successful in an environment where cybercriminal gangs adapt and develop constantly. Although previous takedowns have shown initial success in disrupting gangs on a technical level, law-enforcement agencies have recognized the need to go further and think outside of the box.
Adding a twist, ransomware takedown teams are focusing on publicly damaging groups’ credibility, acknowledging the fact that reputation and trust are (somewhat counterintuitively) valued commodities on the Dark Web.
Law enforcement’s new approach was rolled out with Operation Cronos, the disruption campaign against one of the most prolific ransomware gangs, LockBit.
With a force of 10 countries’ law-enforcement agencies, the highlights of the takedown included 34 servers being seized, 200 cryptocurrency accounts being frozen, and two arrests taking place, and it didn’t stop there.
The National Crime Agency (NCA) deployed psyops methods, using LockBits’ own site, which it had hijacked, to publish images of LockBit’s administration system and leak internal conversations, while publishing the usernames and login details of 194 LockBit “affiliate” members. Then, the unmasking of “LockBitSupp” — the gang’s leader — was teased with a countdown timer on the LockBit website, eventually naming him as Dmitry Khoroshev. Law enforcement also implied that he had collaborated with them by leaking the affiliate’s details, creating more doubt among Dark Web associates.
To read the complete article, visit Dark Reading.