<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Ransomware]]></title><description><![CDATA[My thoughts about ransomware]]></description><link>https://ransomwaresommelier.com</link><image><url>https://ransomwaresommelier.com/img/substack.png</url><title>Ransomware</title><link>https://ransomwaresommelier.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 19 Apr 2026 00:51:43 GMT</lastBuildDate><atom:link href="https://ransomwaresommelier.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Allan Liska]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[ransomware@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[ransomware@substack.com]]></itunes:email><itunes:name><![CDATA[Allan Liska]]></itunes:name></itunes:owner><itunes:author><![CDATA[Allan Liska]]></itunes:author><googleplay:owner><![CDATA[ransomware@substack.com]]></googleplay:owner><googleplay:email><![CDATA[ransomware@substack.com]]></googleplay:email><googleplay:author><![CDATA[Allan Liska]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Is the Ransomware Trust Paradox Breaking?]]></title><description><![CDATA[And, is that a good thing?]]></description><link>https://ransomwaresommelier.com/p/is-the-ransomware-trust-paradox-breaking</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/is-the-ransomware-trust-paradox-breaking</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Wed, 20 Aug 2025 14:16:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b390d519-8b8c-487e-95dc-6ffae3e99dcc_179x281.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In his excellent book, <strong><a href="https://bookshop.org/p/books/ransom-war-how-cyber-crime-became-a-threat-to-national-security-max-smeets/22025178">Ransom War: How Cybercrime Became a Threat to National Securit</a>y</strong>, Max Smeets introduces the concept of the <em>Ransomware Trust Paradox</em>:</p><div class="preformatted-block" data-component-name="PreformattedTextBlockToDOM"><label class="hide-text" contenteditable="false">Text within this block will maintain its original spacing when published</label><pre class="text"><em>Despite their inherently deceiving activities&#8230;ransomware groups must convince their victims of their trustworthiness. This trust encompasses not just the promise not to release the stolen data but also the assurance that payment will result in the decryption of the affected systems. This makes branding and reputation-building activities not peripheral but central to ransomware&#8217;s operational success. </em></pre></div><p>This has largely been the case since ransomware really became professionalized in 2018-2019 (though, you could argue that the professionalization started in 2016 with the Hollywood Presbyterian attack). Ransomware groups are filled with scummy bastards, absolute trash human beings who deserve the worst possible fates &#8212; sorry, I lost my train of thought for a second &#8212; but they are money grubbing capitalist scummy bastards so they will ensure their software works and your data won&#8217;t be leaked (though, it most-assuredly will <strong>NOT BE</strong> deleted) in order to get paid. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NWNm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NWNm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NWNm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NWNm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NWNm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NWNm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg" width="179" height="281" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:281,&quot;width&quot;:179,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Amazon.com: Ransom War: How Cyber Crime ...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Amazon.com: Ransom War: How Cyber Crime ..." title="Amazon.com: Ransom War: How Cyber Crime ..." srcset="https://substackcdn.com/image/fetch/$s_!NWNm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NWNm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NWNm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NWNm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a55f05f-9392-4d74-afe0-2f2305f32856_179x281.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But, it appears the ransomware trust paradox may be breaking down. According to multiple reports (and my own observation), despite the number of ransomware attacks generally being up in 2024 and 2025, the <a href="https://blog.knowbe4.com/ransomware-trends-in-2025">percentage</a> of <a href="https://www.chainalysis.com/blog/crypto-crime-ransomware-victim-extortion-2025">victims who pay a ransom</a> and the size of those <a href="https://www.hipaajournal.com/ransomware-payments-record-low/">ransom payments has decreased</a>. Now, ransomware analysis is never an exact science and other organizations have reported an increase in<a href="https://news.sophos.com/en-us/2025/08/19/the-state-of-ransomware-in-retail-2025/"> ransom payments</a>. </p><p>Why is it that after all this time victims are starting to wise up to the fact that you can&#8217;t trust ransomware groups? I think there are few reasons:</p><ol><li><p>The rise of the <a href="https://www.coveware.com/blog/2025/4/29/the-organizational-structure-of-ransomware-threat-actor-groups-is-evolving-before-our-eyes">lone wolf</a> ransomware actor. We are seeing more single ransomware actors who are not part of a group, therefore have not built up that reputation needed for trust. </p></li><li><p>If your data is encrypted, it is increasingly likely the ransomware group-supplied <a href="https://www.kaspersky.com/blog/ransomware-trends-2025-and-5-new-reasons-not-to-pay/53386/">decryptor will not work.</a> </p></li><li><p>Law Enforcement actions are <a href="https://www.s-rminform.com/latest-thinking/crackdowns-and-takedowns-disrupting-ransomware-in-2025">having an impact</a>. I think this has a lot to do with numbers 1 &amp; 2. Big RaaS groups are becoming rarer as they make easy targets for law enforcement. This certainly drives many ransomware affiliates to strike out on their own, creating the conditions for the lone wolf actors and lone wold actors don&#8217;t have the resources to tweak and improve their decryptors, leading to number 2. Evidence of a lot of this can be found with the relative success we are seeing with &#8220;closed&#8221; RaaS groups like Akira and Qilin. </p></li><li><p>The switch to the &#8220;data exfitration only&#8221; model may be driving some of this as well. In 2025, depending on your view, most ransomware attacks don&#8217;t involve encryption only data exfiltration. This is certainly easier for the ransomware groups and can be just as <em>devastating</em> for some victims, but only some. Many organizations view don&#8217;t feel the same urgency, or no urgency at all, to pay a ransom after a data leak, simply because there is so much leaked data available, their data is likely to be lost in the see of leaks. This is a very cynical, but accurate, view. </p></li></ol><p>As with any &#8220;ransomware trend&#8221; things can change on a dime. Ransomware groups are always finding new ways to be scummy bastards and make money. So, I am not saying the ransomware trust paradox is completely dead, but it does seem to be on life support right now. </p><p>What do you think?</p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[No One Cares About Ransomware]]></title><description><![CDATA[Except us...and Ransomware Groups]]></description><link>https://ransomwaresommelier.com/p/no-one-cares-about-ransomware</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/no-one-cares-about-ransomware</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Wed, 02 Apr 2025 15:48:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!plh8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Did you know that ransomware attacks against schools are up significantly for the first quarter of 2025?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!plh8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!plh8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 424w, https://substackcdn.com/image/fetch/$s_!plh8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 848w, https://substackcdn.com/image/fetch/$s_!plh8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 1272w, https://substackcdn.com/image/fetch/$s_!plh8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!plh8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png" width="810" height="501" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:501,&quot;width&quot;:810,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:44325,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://ransomwaresommelier.com/i/160425765?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!plh8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 424w, https://substackcdn.com/image/fetch/$s_!plh8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 848w, https://substackcdn.com/image/fetch/$s_!plh8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 1272w, https://substackcdn.com/image/fetch/$s_!plh8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e494b1e-9ad8-4489-8738-ab03becbca74_810x501.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They are. How about healthcare providers? Those attacks also increased significantly in the first quarter of 2025. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zAAa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zAAa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 424w, https://substackcdn.com/image/fetch/$s_!zAAa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 848w, https://substackcdn.com/image/fetch/$s_!zAAa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 1272w, https://substackcdn.com/image/fetch/$s_!zAAa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zAAa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png" width="800" height="494" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:494,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:44716,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ransomwaresommelier.com/i/160425765?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zAAa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 424w, https://substackcdn.com/image/fetch/$s_!zAAa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 848w, https://substackcdn.com/image/fetch/$s_!zAAa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 1272w, https://substackcdn.com/image/fetch/$s_!zAAa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1e884fb-8ba8-48c6-82c2-a0d12028c6e2_800x494.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>By almost every estimate that I&#8217;ve seen, ransomware attacks are up across the board in the first quarter of 2025. </p><p><strong>NO. ONE. CARES.</strong></p><p>I mean, you do; you&#8217;re reading this. But, for the most part no one cares and I am trying to figure out why that is. I&#8217;ve talked about ransomware fatigue in the Board Room before, but this is different. Even reporters who normally write about ransomware aren&#8217;t writing about incidents with the frequency they used to. I&#8217;ve even had several reporters tell me that CL0P has complained no one is covering their <a href="https://cyberscoop.com/clop-cleo-file-transfer-software-breach-fin11/">Cleo exploit</a> and subsequent data leaks. </p><p>I think the problem is one of the <a href="https://www.un.org/sites/un2.un.org/files/attention_economy_feb.pdf">attention econom</a>y [PDF]. There is a A LOT happening now, and there is a lot of bad happening now. It&#8217;s hard to draw people&#8217;s limited attention to ransomware when there is so much new badness every day. </p><p>To some extent ransomware as always thrived by being able to manipulate the attention economy, but this is especially true since 2019 and the advent of data leak sites. By dripping data leaks slowly and, often salaciously, ransomware groups have been able to command the attention of reporters and researchers. But, it&#8217;s hard to compete with a random dude dropping <a href="https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/">Oracle credentials</a> or the Chinese government <a href="https://www.cybersecuritydive.com/news/china-linked-attacks-infiltrate-networks/734576/">infiltrating most major US telecoms</a> or, well, <a href="https://www.schneier.com/blog/archives/2025/03/the-signal-chat-leak-and-the-nsa.html">everything</a>. </p><p>Ransomware groups have been masterful at controlling the attention economy, but their power to do so is fading. Unless there is a new equivalent to Colonial Pipeline or United Healthcare ransomware attacks will continue to get less attention and that may have an unintended consequence. </p><p>You see, despite ransomware attacks being up this quarter, all signs point to the number and amount of ransomware payments being down. The same is true for last year, more publicly reported ransomware attacks but less money being paid to ransomware groups. If attacks continue to get less attention there may be even less incentive for victims to pay, especially as encryption falls out of favor for many ransomware groups. </p><p>Could the end of ransomware really be as simple as ignoring the threat actors? One can only hope. </p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Defense is Wrong: Periodic Reminder that LockBitSupp is a Lying Bastard]]></title><description><![CDATA[I love My Cousin Vinnie So Much]]></description><link>https://ransomwaresommelier.com/p/the-defense-is-wrong-periodic-reminder</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/the-defense-is-wrong-periodic-reminder</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Sat, 22 Jun 2024 08:51:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/W7YoxrKa4f0" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My Cousin Vinnie is one of my favorite movies and my favorite scene is when the always amazing Marisa Tomei is forced to testify in the trial and exclaims, &#8220;The defense is wrong!&#8221; and then goes on to prove the defense&#8217;s case. </p><div id="youtube2-W7YoxrKa4f0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;W7YoxrKa4f0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/W7YoxrKa4f0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Anyway, my point is that there have been a lot of <a href="https://siliconangle.com/2024/06/20/lockbit-resurgence-sees-ransomware-attacks-reach-record-high-may/">headlines</a> about the &#8220;resurgence of LockBit&#8221; in May after law enforcement action and I am here to remind the whole world: <strong>LockBitSupp is a Lying Bastard&#8482; and Please Stop Listening to Him.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Is LockBit ransomware cooked? I can&#8217;t say, they have been down a number of times but always seem to come back, but May does not appear to be an example of that comeback. </p><p>Val&#233;ry Rie&#223;-Marchive at LeMagIT has already taken a <a href="https://www.lemagit.fr/actualites/366589312/Ransomware-un-mois-de-mai-aux-chiffres-indument-gonfles-par-LockBit">thorough look at the data</a> and come to same conclusion. At least 68 of the &#8220;record number of victims&#8221; are simply old victims being re-posted. It also looks like some of the &#8220;new&#8221; victims aren&#8217;t real either. </p><p>Don&#8217;t get me wrong, even if LockBit posted 100 victims in May, that would be bad, but it is very different that 176 and it would be out of line compared to what we&#8217;ve seen in recent months with just 40 victims in March and April and even less than that to this point in June. I think of May as more of a &#8220;last gasp&#8221; from a slowly dying ransomware group &#8212; that&#8217;s not just wishful thinking on my part. LockBitSupp has become a pariah in the underground community and lost the trust of so many ransomware affiliates and partners that it will be hard for him to get back to where he once was. </p><p>Of bigger concern right now is the fact that so many of the newly formed ransomware groups are making use of the leaked LockBit code, so we are seeing a big increase in ransomware attacks using leaked LockBit code, but not related to the original LockBit. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[A Ransomware Domain Mystery]]></title><description><![CDATA[Or maybe I am just procrastinating...]]></description><link>https://ransomwaresommelier.com/p/a-ransomware-domain-mystery</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/a-ransomware-domain-mystery</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Sun, 16 Jun 2024 16:32:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kIxv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Happy Sunday dear readers and please don your Sherlock Cap to help sus out this mystery. I regularly track newly-registered ransomware-themed domain names to see if there are any interesting patterns and I might have one. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kIxv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kIxv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!kIxv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!kIxv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!kIxv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kIxv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png" width="410" height="410" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:410,&quot;bytes&quot;:57125,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kIxv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 424w, https://substackcdn.com/image/fetch/$s_!kIxv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 848w, https://substackcdn.com/image/fetch/$s_!kIxv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 1272w, https://substackcdn.com/image/fetch/$s_!kIxv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8fb227e2-764a-4398-8064-9c115ed856b7_1000x1000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Since the beginning of June, there have been three seemingly related domains registered: </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>June 15th</strong> - ransomware-recovery-method-916663[.]zone</p></li><li><p><strong>June 13th </strong>- ransomware-recovery-method-75138236[.]today</p></li><li><p><strong>June 5th</strong> - ransomware-recovery-method-377612[.]world</p></li></ul><p>The [.]world and [.]zone domain names were registered through enom, while the [.]today domain was registered through GoDaddy. None of the domains have subdomains, as far as I can tell, and all are currently parked. </p><p><em>None of them register as being malicious on any of the usual sites. </em></p><p>But, this feels shady. And so much of what we do in intelligence analyst starts with your Spidey Sense tingling. Of course, as any good analyst will tell you, sometimes your Spidey Sense is wrong and it just sends you down a path that leads to nowhere. </p><p>For now, I am going to keep my eyes out for these domains, and any new domains that match the pattern, to see if anything changes. If anything does change I will update you all. </p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Rural Healthcare Getting Destroyed by Ransomware]]></title><description><![CDATA[And we don't seem to have a solution]]></description><link>https://ransomwaresommelier.com/p/rural-healthcare-getting-destroyed</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/rural-healthcare-getting-destroyed</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Thu, 06 Jun 2024 18:05:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gfuR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I am sure most of you read the story from Christian Vasquez in CyberScoop about the unrelenting attacks on <a href="https://cyberscoop.com/rural-hospital-ransomware-cyber/">rural healthcare providers</a> by initial access brokers and ransomware groups. </p><p>Looking at collected data, states with a large rural population suffer an outsized number of ransomware attacks based on population. But, even when they don&#8217;t, attacks on large healthcare providers disproportionately impact rural areas where they may not have enough resources to survive service disruptions caused by ransomware attacks to large providers. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The <a href="https://www.fdd.org/analysis/2024/06/04/healthcare-cybersecurity-needs-a-check-up/">linked report</a> from the Foundation for the Defense of Democracies is worth reading in full and there are a lot of excellent ideas in the report. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gfuR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gfuR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 424w, https://substackcdn.com/image/fetch/$s_!gfuR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 848w, https://substackcdn.com/image/fetch/$s_!gfuR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 1272w, https://substackcdn.com/image/fetch/$s_!gfuR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gfuR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png" width="578" height="457.71565934065933" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1153,&quot;width&quot;:1456,&quot;resizeWidth&quot;:578,&quot;bytes&quot;:411354,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gfuR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 424w, https://substackcdn.com/image/fetch/$s_!gfuR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 848w, https://substackcdn.com/image/fetch/$s_!gfuR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 1272w, https://substackcdn.com/image/fetch/$s_!gfuR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e62ee77-42de-485f-ac6f-6dd576892fb7_2991x2369.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There are two recommendations from the report that I want to focus on:</p><ol><li><p><strong>Create a Rural Hospital Cybersecurity Workforce Development Strategy</strong></p></li><li><p><strong>Develop Regional Contingency Plans for Healthcare Providers</strong></p></li></ol><p>We talk a lot about solving the rural healthcare provider ransomware problem by throwing money at it. But, money will not solve the problem without the right personnel in place to manage the technology. But, I also wonder how some of these hospitals that are struggling to make ends meet would feel about hundreds of thousands of dollars being allocated to cybersecurity when they are struggling to find the budget to cover basic healthcare needs for their patients (I&#8217;ve had similar conversations with small towns who have some of the same concerns). </p><p>I wonder if an <a href="https://www.cisecurity.org/ms-isac">MS-ISAC</a> model might make more sense, where there is more centralized monitoring and alerting that covers many hospitals at once. The hospitals would need assistance to get logging set up and running, but it would allow for more effective use of people and resources while improving security overall.</p><p>The 2nd point, regional contingency plans, are also critical. Some rural hospitals are 50 miles or more away from the next closest hospital. This makes it harder to make regional contingency plans, but it still needs to be done, ideally in person. Not only do rural hospitals have to plan for what happens when they, or one of their &#8220;neighboring&#8221; hospitals, are hit with a ransomware attack, but what are you going to do if a national provider is hit and staff have challenges filling prescriptions, making appointments or treating patients. Ideally, tabletop exercises like these can be led by <a href="https://www.hhs.gov/">HHS</a> or the <a href="https://h-isac.org/">Health-ISAC</a>, organizations that have experience with everything that can go wrong during one of these attacks. </p><p>We need more focus on protecting rural healthcare, not just from cyberattacks but from everything impact these organizations. But my focus is on cybersecurity,  so I am going to focus on how we can make that better. </p><div><hr></div><h1><strong>Yours Truly Dollar #4 Kickstarter is Live!</strong></h1><p>The <a href="https://www.kickstarter.com/projects/greenarchercomics/yours-truly-johnny-dollar-4-the-final-battle">Kickstarter</a> for our last <a href="https://www.kickstarter.com/projects/greenarchercomics/yours-truly-johnny-dollar-4-the-final-battle">Yours Truly, Johnny Dollar</a> comic book is live and we could really use your support! In this issue (surprisingly relevant) Johnny has to deal with the fallout of a ransomware attack agains the UK Healthcare system. We&#8217;ve hit our funding goal, but I would love it if we could get to 100 backers and show the world that there are more ways to tell cybersecurity stories than through PDF and PowerPoint. </p><p>Thank you all for your support!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vL13!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vL13!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vL13!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vL13!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vL13!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vL13!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg" width="1456" height="2189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2189,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:597451,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vL13!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vL13!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vL13!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vL13!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8605069-ab8f-4dba-835e-376b205521ba_2085x3135.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ransomware Attacks Against Local Governments Accelerating]]></title><description><![CDATA[Errr...well, continuing to accelerate.]]></description><link>https://ransomwaresommelier.com/p/ransomware-attacks-against-local</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/ransomware-attacks-against-local</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Sat, 30 Mar 2024 14:32:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UV3Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As I write this, there have been 54 <em><strong>publicly reported </strong></em>ransomware attacks against state and local governments around the world in 2024. The publicly reported part is important because the real number, as always, is likely much higher. </p><p>On the surface, this seems like good news. In all of 2023 there were 256 publicly reported attacks on state and local governments, so extrapolating first quarter numbers we should end the year at 216, a drop from 2023. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>My concern is with the way the attacks have been accelerating in 2024. Take a look at Figure 1. We&#8217;ve seen a steep incline in the number of attacks, and we are seeing that incline earlier than in previous years. While January started off relatively slow with 13 attacks, we saw 19 in February and 22 so far in March (there is often a delay in reporting, so we&#8217;ll likely see March&#8217;s numbers trending up. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UV3Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UV3Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 424w, https://substackcdn.com/image/fetch/$s_!UV3Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 848w, https://substackcdn.com/image/fetch/$s_!UV3Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 1272w, https://substackcdn.com/image/fetch/$s_!UV3Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UV3Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png" width="800" height="495" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:495,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59689,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UV3Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 424w, https://substackcdn.com/image/fetch/$s_!UV3Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 848w, https://substackcdn.com/image/fetch/$s_!UV3Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 1272w, https://substackcdn.com/image/fetch/$s_!UV3Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc268fb21-76e2-4186-b6f0-1ed8ac1521d2_800x495.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1: Ransomware attacks against local governments by month 2021 -2024</figcaption></figure></div><p>In particular, February and March&#8217;s numbers are worrying because they represent the highest and second highest numbers, respectively, recorded in those months (see Figure 2).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nyu4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nyu4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 424w, https://substackcdn.com/image/fetch/$s_!Nyu4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 848w, https://substackcdn.com/image/fetch/$s_!Nyu4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 1272w, https://substackcdn.com/image/fetch/$s_!Nyu4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nyu4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png" width="1098" height="721" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae755893-d079-492d-a1c0-a95f594f3906_1098x721.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:721,&quot;width&quot;:1098,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:78634,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Nyu4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 424w, https://substackcdn.com/image/fetch/$s_!Nyu4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 848w, https://substackcdn.com/image/fetch/$s_!Nyu4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 1272w, https://substackcdn.com/image/fetch/$s_!Nyu4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae755893-d079-492d-a1c0-a95f594f3906_1098x721.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2: Raw Numbers of Recorded Ransomware Attacks by Month</figcaption></figure></div><p>This likely indicates that we are in a rough year for ransomware attacks on State / Local / Tribal governments, combined with the added threats from an election year could mean an all out assault on local governments worldwide. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wlGu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wlGu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 424w, https://substackcdn.com/image/fetch/$s_!wlGu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 848w, https://substackcdn.com/image/fetch/$s_!wlGu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 1272w, https://substackcdn.com/image/fetch/$s_!wlGu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wlGu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png" width="1338" height="828" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:828,&quot;width&quot;:1338,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wlGu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 424w, https://substackcdn.com/image/fetch/$s_!wlGu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 848w, https://substackcdn.com/image/fetch/$s_!wlGu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 1272w, https://substackcdn.com/image/fetch/$s_!wlGu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63cfbdd3-3758-4248-9b47-ec3b98536434_1338x828.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 3: Ransomware Groups Attacking Local Governments</figcaption></figure></div><p>And, as Figure 3 demonstrates, it isn&#8217;t just one group. The 54+ attacks have been carried out by 20+ different groups. So, there is a lot of attention being paid to local governments by many ransomware groups. </p><p>CISA and other government agencies are working to help shore up defenses of local and tribal governments, but it may not be enough. </p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[LockBit Down!]]></title><description><![CDATA[LockBit Ransomware&#8217;s infrastructure has been seized through a global joint law enforcement action.]]></description><link>https://ransomwaresommelier.com/p/lockbit-down</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/lockbit-down</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Mon, 19 Feb 2024 22:10:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uNSI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>LockBit Ransomware&#8217;s infrastructure has been seized through a global joint law enforcement action. It is not just their main site, it appears most negotiation and portal sites are now under the control of law enforcement. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uNSI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uNSI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uNSI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uNSI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uNSI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uNSI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg" width="1088" height="631" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:631,&quot;width&quot;:1088,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!uNSI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uNSI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uNSI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uNSI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa933d938-40e3-45cd-8b39-4d0aa1304841_1088x631.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image courtesy <a href="https://twitter.com/UK_Daniel_Card/status/1759685711974871484/p">Daniel Card</a></figcaption></figure></div><p>This is unequivocally good news. The LockBit ransomware group has been around since 2019 and is responsible for thousands of ransomware victims. Operating as an largely open Ransomware-as-a-Service, they had more affiliates than any other group (at least as far as I know) and their level of destruction was unprecedented among RaaS groups. </p><p>According to law enforcement, there is a second shoe that is going to drop tomorrow, so tune in for more details. </p><p>It is very unlikely that the core of the LockBit group, which is based in Russia, will be arrested but this disruption will have a significant impact on the ransomware ecosystem and we should enjoy that disruption before we get quickly back to building our defenses. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Support Yours Truly, Johnny Dollar #3 ]]></title><description><![CDATA[Help us reach our goal!]]></description><link>https://ransomwaresommelier.com/p/support-yours-truly-johnny-dollar</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/support-yours-truly-johnny-dollar</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Wed, 07 Feb 2024 02:03:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hwpJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey all - quick break from ransomware to talk about&#8230;a ransomware comic book.</p><p>We are in the middle of our <a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-3">crowdfunding campaign</a> for Yours Truly, Johnny Dollar #3 and we could use your support to get us <a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-3">over the top</a>!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hwpJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hwpJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hwpJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hwpJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hwpJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hwpJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg" width="1456" height="1978" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1978,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2417973,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hwpJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hwpJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hwpJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hwpJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff390e8-5c39-41e2-bee8-d759915e1788_3313x4500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this issue Johnny must head to Billings, Montana to deal with the aftermath of a ransomware attack on a school system. Johnny has to fight off angry parents who, understandably, don&#8217;t want to see their kids sensitive data publishing online. </p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y7IQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y7IQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 424w, https://substackcdn.com/image/fetch/$s_!y7IQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 848w, https://substackcdn.com/image/fetch/$s_!y7IQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!y7IQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y7IQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg" width="1456" height="2189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2189,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:427022,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y7IQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 424w, https://substackcdn.com/image/fetch/$s_!y7IQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 848w, https://substackcdn.com/image/fetch/$s_!y7IQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!y7IQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe06c7c2f-2f73-464b-affe-da7595db22ce_2085x3135.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TlKK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TlKK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TlKK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TlKK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TlKK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TlKK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg" width="1456" height="2189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2189,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:391435,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TlKK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TlKK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TlKK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TlKK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3816c529-7252-40e5-a094-96193014f5f6_2085x3135.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In addition to the usual great artwork from our team, we also have a few special rewards for higher backers including an homage to Captain America #1. Four separate prints where Johnny punches a ransomware actor - something I know you all would love to hang on your wall.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G28D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G28D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G28D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G28D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G28D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G28D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg" width="1456" height="2232" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2232,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3008469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G28D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 424w, https://substackcdn.com/image/fetch/$s_!G28D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 848w, https://substackcdn.com/image/fetch/$s_!G28D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!G28D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1415d6-3ffa-45c6-9193-354cb3093abc_5063x7763.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Once again, if you can help us get over the<a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-3"> finish line</a>, I&#8217;d really appreciate it! </p>]]></content:encoded></item><item><title><![CDATA[The Conjoined Triangle of Ransomware]]></title><description><![CDATA[Working towards a simplified solution to ransomware defense]]></description><link>https://ransomwaresommelier.com/p/the-conjoined-triangle-of-ransomware</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/the-conjoined-triangle-of-ransomware</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Wed, 24 Jan 2024 15:45:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/TwYczl2yOh8" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I confess, I am a big fan of Silicon Valley. It is absolutely one of my comfort shows. So, as I have been toying with the idea of a simplified version of ransomware defense, this scene kept running through my head.</p><div id="youtube2-TwYczl2yOh8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;TwYczl2yOh8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/TwYczl2yOh8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>People ask me all the time for the &#8220;one thing&#8221; they can do to prevent ransomware attacks. The truth is, despite some vendors&#8217; claims, there is no &#8220;one thing,&#8221; it takes a comprehensive security program to effectively protect against initial access brokers and ransomware operators. </p><p>Then the conversation turns to, &#8220;where should I start?&#8221; </p><p>And that is where my &#8220;ransomware triangle&#8221; comes into play. If the best ransomware defense is to keep the ransomware actor from ever getting in the network, then your defense should focus on the ways that <em>most </em>ransomware groups gain access (either directly or through IABs). </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eM7V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eM7V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eM7V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eM7V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eM7V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eM7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg" width="720" height="405" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:405,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:17971,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eM7V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eM7V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eM7V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eM7V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c341f0c-13d0-48a1-bcb3-7d56c48c8ee3_720x405.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Most research agrees that the three most common ways that IABs breach organizations are (in no particular order):</p><ol><li><p>Phishing</p></li><li><p>Credential Leaks / Stuffing</p></li><li><p>Exploitation </p></li></ol><p>So, focusing on knowing what you have, and where you have it (including your data) along with keeping those systems patched in a timely and properly prioritized manner while knowing your when employee credentials have potentially been compromised or employee accounts are accessing systems they probably shouldn&#8217;t will allow organizations to stop most ransomware attacks. </p><p>That was a mouthful of a sentence because, let&#8217;s face it, if the three things outlined above were easy everyone would be doing it and we wouldn&#8217;t have a ransomware epidemic on our hands.</p><p>That being said, I do think it is important to spell out what needs to be done for organizations to protect themselves and all of these are realistic goals that almost every organization can accomplish without requiring a huge security budget. </p><p>I am still working through the practical side of this, but I would love your thoughts on this and, in particular, if there is anything I am missing. </p><h2>Yours Truly, Johnny Dollar #3</h2><p>We are getting ready to launch the Kickstarter for the <a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-3">3rd Issue of Yours Truly, Johnny Dollar</a>. In this issue Johnny travels to Billings, Montana to tackle a ransomware attack against a school system. </p><p>First day support for Kickstarter campaigns is so important so I would really appreciate it if you would consider backing us on the first day. You can set a reminder to be notified of the launch by going to <a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-3">our pre-launch page</a>. </p><p>Thank you for your continued support!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u4eU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u4eU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u4eU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u4eU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u4eU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u4eU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg" width="1456" height="1029" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1691419,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u4eU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u4eU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u4eU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u4eU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ad1f6b9-9489-40b9-8da7-16efb81b063d_3508x2480.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Problem with Relying on Criminals for Data]]></title><description><![CDATA[Ransomware attacks were up 70% in 2023...we think]]></description><link>https://ransomwaresommelier.com/p/the-problem-with-relying-on-criminals</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/the-problem-with-relying-on-criminals</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Mon, 15 Jan 2024 16:34:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kLPn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>How many ransomware attacks were there in 2023? </h3><p>According to data scraped from data leak sites, there were ~4399 (sites go up an down, scrapers break, etc, so this number is always an estimate). In all of 2022 there were 2581 victims posted to data leak sites. That is a 70% increase between 2022 to 2023. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kLPn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kLPn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 424w, https://substackcdn.com/image/fetch/$s_!kLPn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 848w, https://substackcdn.com/image/fetch/$s_!kLPn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 1272w, https://substackcdn.com/image/fetch/$s_!kLPn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kLPn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png" width="1456" height="1628" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1628,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:236699,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kLPn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 424w, https://substackcdn.com/image/fetch/$s_!kLPn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 848w, https://substackcdn.com/image/fetch/$s_!kLPn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 1272w, https://substackcdn.com/image/fetch/$s_!kLPn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d5c8a1-af00-451b-aafc-1b21eb900bc9_3277x3663.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">That is a very Zen-like pose for a cybercriminal</figcaption></figure></div><p>The problem is, almost all reporting on ransomware attacks relies on data from ransomware actors. Some companies, like <a href="https://www.coveware.com/ransomware-blog">Coveware</a>, will publish regular reports based on numbers from cases they&#8217;ve worked and most incident response companies can provide trending data based on what they&#8217;ve seen, but they can&#8217;t share too much information because of client NDAs and other agreements.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Even governments which require reporting from specific sectors generally don&#8217;t share that information publicly (with some <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">exceptions</a>) even through it would be incredibly useful for researchers and the general public. </p><p>At the upper bounds of ransomware attacks, this situation could be changing with the new <a href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/sec-final-cybersecurity-disclosure-rules.html">SEC breach disclosure rules</a>. But, most ransomware attacks are not against publicly traded companies in the United States (we think). And, of course, we have to be careful that breach disclosure rules cannot easily be weaponized by the <a href="https://www.darkreading.com/cyber-risk/hackers-weaponize-sec-disclosure-rules-against-corporate-targets">cybercriminals</a>. </p><p>Why is it a bad idea to trust cybercriminals for breach reporting? The obvious answer is that ransomware groups are liars. But, specifically, researcher <a href="https://twitter.com/ValeryMarchive">Val&#233;ry Rie&#223;-Marchive</a> has documented numerous cases of ransomware groups double-posting victims or just making up victims in an effort to &#8220;pad their numbers.&#8221; </p><p>We consistently see underreporting of victims from ransomware groups. Some of that comes from the estimated 25-30% of victims who pay the ransom, but there are a host of reasons that a victim may not appear on data leak site. One of the most common, possibly more common than the victim paying the ransom, is that the affiliate just grabbed useless or no data from victim during the exfiltration stage. Ransomware groups are often loathe to post data that they deem invaluable or impactful and data exfiltrations fail for a variety of reasons. </p><p>That&#8217;s why when ransomware groups are taken down, we often find that as many as 80% victims never made it to the extortion site (for example, the <a href="https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant">Hive takedown</a>).</p><p>So, what can we do? The easiest solution is for governments that require reporting to start making that data more available. Of course, doing so will require more streamlined reporting, something the government (in the US) <a href="https://www.gao.gov/blog/u.s.-less-prepared-fight-cybercrime-it-could-be">is actively working on</a>, but is definitely not there yet. We also have to find ways for organizations to more easily share data so that we all understand what the situation looks like, again without running afoul of NDA or other confidentially agreements. </p><p>Unfortunately, until then, we are stuck with the same problem: Relying on criminals to provide us with numbers that we know are incomplete and inaccurate.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ransomware from Turkey and Brazil and...]]></title><description><![CDATA[What Easy Access to Code and Victims Means for the Future of Ransomware]]></description><link>https://ransomwaresommelier.com/p/ransomware-from-turkey-and-brazil</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/ransomware-from-turkey-and-brazil</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Tue, 09 Jan 2024 17:21:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HDxV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Record has a new story out about a threat group, operating out of Turkey, <a href="https://therecord.media/turkish-hackers-targeting-databases-mimic">deploying Mimic Ransomware</a> against Microsoft SQL Servers. First and foremost, if you have an MS SQL exposed to the Internet make sure it is fully patched and only administratively accessible through a VPN and secured with MFA. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HDxV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HDxV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 424w, https://substackcdn.com/image/fetch/$s_!HDxV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 848w, https://substackcdn.com/image/fetch/$s_!HDxV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 1272w, https://substackcdn.com/image/fetch/$s_!HDxV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HDxV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png" width="846" height="590" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:590,&quot;width&quot;:846,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:112581,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HDxV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 424w, https://substackcdn.com/image/fetch/$s_!HDxV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 848w, https://substackcdn.com/image/fetch/$s_!HDxV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 1272w, https://substackcdn.com/image/fetch/$s_!HDxV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0478583c-6ccd-4ad1-ab22-c25f6a163f2a_846x590.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But, I think this article highlights something that is a growing pattern: The move away from Russia as a locus of control for ransomware groups. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Don&#8217;t get me wrong, for years, there have been ransomware affiliates from around the world. We&#8217;ve seen affiliates arrested in Romania, South Korea, India, Canada and the United States. But, much of the core leadership of typical <em><strong>cybercriminal</strong></em> ransomware groups resided in Russia or Ukraine (Iran, North Korea and China were more nation state or hybrid models). </p><p>But, that is starting to change. The big ransomware groups are still, largely, based in Russia. But, now that ransomware code is largely available and, with the increased initial access broker activity, so are victims we are seeing smaller ransomware groups pop up with leadership based in other parts of the world. </p><p>One of the challenges in tracking these groups (aside from attribution is hard) is that they tend to be smaller and not as well organized as the more established Russian threat actors, so getting a handle on how big this problem really is is going to be a challenge in 2024. But, as long as ransomware remains profitable, we can expect to see more <em><strong>cybercriminal</strong></em> ransomware groups wholly operating from places outside of Russia. Which means we can look forward to even more attacks. </p><p>Welcome to 2024, it will look a lot like 2023, but worse. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Okay, Fine Let’s Talk About Scattered Spider]]></title><description><![CDATA[The royalty free image should be interesting]]></description><link>https://ransomwaresommelier.com/p/okay-fine-lets-talk-about-scattered</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/okay-fine-lets-talk-about-scattered</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Sat, 18 Nov 2023 16:05:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pvhG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Before getting to Scattered Spider, I&#8217;d like to ask your support for our <a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-2/">Kickstarter</a> Campaign to fund the 2nd Issue of Yours Truly, Johnny Dollar. We&#8217;ve already hit our funding goal, but we&#8217;d love to get some more backers. In the 2nd issue Johnny travels to Milan to stop a ransomware attack against a water treatment facility while dodging hitmen bent on killing him. If you love pulp detective stories and hate ransomware, I promise you <a href="https://www.kickstarter.com/projects/2119389421/yours-truly-johnny-dollar-2/">will love this issue</a>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pvhG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pvhG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pvhG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pvhG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pvhG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pvhG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg" width="1456" height="2278" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2278,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8241147,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pvhG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pvhG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pvhG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pvhG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373f7316-204d-4b0a-b7a2-1cdbf747f1d8_3260x5100.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>CISA released an excellent report on <a href="https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider.pdf">Scattered Spider</a> [PDF] this week and Scattered Spider has been top of mind, rightfully so, for many security teams. Scattered Spider are believed to be younger threat actors, most likely based in Western countries (some have suggested London and New York - but I am not sure there is evidence for that). The fact that they are native, or near native, English speakers has allowed them to pull off attack-types that other groups struggle with, especially social engineering attacks. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>What is interesting to me about Scattered Spider is that while they are generally lumped in with ransomware groups, they are more chaos agents than they are ransomware actors and that is an important distinction. Their primary focus seems to be causing trouble, and making money is secondary. </p><p>They definitely have <a href="https://www.wsj.com/business/hospitality/caesars-paid-ransom-after-suffering-cyberattack-7792c7f0">made money</a>, but in cases where I have been involved, they definitely seem more interested in disrupting operations and generating headlines, the money is almost secondary. Even when they&#8217;ve deployed the <a href="https://www.wsj.com/business/hospitality/caesars-paid-ransom-after-suffering-cyberattack-7792c7f0">ALPHV/Black Cat ransomware</a> they have only done it sporadically and not in a typically disruptive manner. </p><p>Microsoft has also reported that they will often send mocking or threatening messages to security teams or other <a href="https://thehackernews.com/2023/10/microsoft-warns-as-scattered-spider.html">employees of victim networks</a> threatening to get them fired or shoot up their house. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1bKf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1bKf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 424w, https://substackcdn.com/image/fetch/$s_!1bKf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 848w, https://substackcdn.com/image/fetch/$s_!1bKf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 1272w, https://substackcdn.com/image/fetch/$s_!1bKf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1bKf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png" width="1456" height="1452" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1452,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1241273,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1bKf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 424w, https://substackcdn.com/image/fetch/$s_!1bKf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 848w, https://substackcdn.com/image/fetch/$s_!1bKf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 1272w, https://substackcdn.com/image/fetch/$s_!1bKf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F682136c4-c105-4ac2-8a2c-6718b094ba6f_3000x2991.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A Surprisingly Appropriate, if Scary Image</figcaption></figure></div><p>There has been lots of really good advice about how organizations can protect themselves against the <a href="https://www.cybersecuritydive.com/news/scattered-spider-social-engineering-mavens/700189/">Scattered Spider attacks</a>. I won&#8217;t try to repeat everything here, instead I encourage you to read the <a href="https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider.pdf">CISA report</a>. I also encourage you to check out the excellent reports from <a href="https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware">Mandiant</a> and <a href="https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/">Microsoft</a>. </p><p>But, know that Scattered Spider is constantly evolving their techniques. So, while the reports above offer excellent advice, in a few months there may be new techniques that need to be addressed. This is one of the problem that many security teams face: New&#8217;ish attack vectors often evolve faster than security teams can keep up. </p><p>The one hope with a group like Scattered Spider is that, because they are likely located in a western country law enforcement will be able to arrest them soon. Not as soon as we would all like, but soon. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Tracking Healthcare Breaches in the United States]]></title><description><![CDATA[Good ole' Section 13402(e)(4) of the HITECH Act]]></description><link>https://ransomwaresommelier.com/p/tracking-healthcare-breaches-in-the</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/tracking-healthcare-breaches-in-the</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Tue, 17 Oct 2023 10:28:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6yY1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Through June of 2023, there were 122<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> <em>publicly reported</em> ransomware attacks against healthcare providers in the United States. But, how many more ransomware attacks were there that we don&#8217;t know about? That is where <a href="https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/understanding/coveredentities/hitechact.pdf">section 13402(e)(4)</a> [PDF] of the HITECH Act. Section 13402(e)(4) states:</p><blockquote><p>(4) POSTING ON HHS PUBLIC WEBSITE.&#8212;The Secretary shall make available to the public on the Internet website of the Department of Health and Human Services a list that identifies each covered entity involved in a breach described in subsection (a) in which the unsecured protected health information of more than 500 individuals is acquired or disclosed.</p></blockquote><p>Basically, any time there is a breach involving the Protected Health Information (PHI) it has to be reported to the <a href="https://www.hhs.gov/">US Department of Health and Human Services</a> (HHS) and the HHS Secretary has to report it on the <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">Breach Portal</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6yY1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6yY1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 424w, https://substackcdn.com/image/fetch/$s_!6yY1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 848w, https://substackcdn.com/image/fetch/$s_!6yY1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!6yY1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6yY1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png" width="410" height="490.2541208791209" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1741,&quot;width&quot;:1456,&quot;resizeWidth&quot;:410,&quot;bytes&quot;:268286,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6yY1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 424w, https://substackcdn.com/image/fetch/$s_!6yY1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 848w, https://substackcdn.com/image/fetch/$s_!6yY1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!6yY1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cb240df-a70c-4976-b773-d22c0b2c09a0_2509x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">This is pretty much the only  stock image that came up for &#8220;healthcare cyberattack.&#8221;</figcaption></figure></div><p>One of the nice things about the HHS Breach Portal is that it is publicly searchable and you can filter by &#8220;Hacking/IT Incident.&#8221; Unfortunately, the portal doesn&#8217;t get more granular than that, so we don&#8217;t know how many of these &#8220;Hacking/IT Incidents&#8221; were ransomware attacks, though we can often reverse engineer the entries to see if we can find reporting since part 2 of that same section states:</p><blockquote><p>(2) MEDIA NOTICE.&#8212;Notice shall be provided to prominent media outlets serving a State or jurisdiction, following the discovery of a breach described in subsection (a), if the unsecured protected health information of more than 500 residents of such State or jurisdiction is, or is reasonably believed to have been, accessed, acquired, or disclosed during such breach.</p></blockquote><p>Healthcare organizations impacted by breaches have 60 days to report the incident to HHS and then HHS takes some time to post it to the portal, so there is often a serious delay. Even as I write this, mid-October there are likely breaches from the first half of 2023 that have not made it to the portal. </p><p>Still, the data can be illuminating: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p6lR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p6lR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 424w, https://substackcdn.com/image/fetch/$s_!p6lR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 848w, https://substackcdn.com/image/fetch/$s_!p6lR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 1272w, https://substackcdn.com/image/fetch/$s_!p6lR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p6lR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png" width="1200" height="302" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:302,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p6lR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 424w, https://substackcdn.com/image/fetch/$s_!p6lR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 848w, https://substackcdn.com/image/fetch/$s_!p6lR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 1272w, https://substackcdn.com/image/fetch/$s_!p6lR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd5927f1-a740-45d4-b4f7-b773425a6257_1200x302.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data is from January 1st through June 30th of each year.</figcaption></figure></div><p>The numbers rise pretty dramatically from 2020 to 2021 and leveled off a bit in 2022. As of right now, they&#8217;ve dipped a bit in 2023, but given delays in reporting they will likely shoot up (for example, running the same search for January 1st through October 15th of 2023 list 413 &#8220;Hacking/IT Incidents&#8221;). In fact, since there were only 64 publicly reported ransomware attacks through June 30th of 2022, I expect the number will increase significantly. </p><p>My point in writing about this is that I think, for all its flaws, the HHS reporting portal is a good model for what government cyber incident/ransomware reporting should look like (the Maine portal is another excellent example). Making reported data like this publicly searchable helps keep consumers informed, but also helps researchers better understand the scope of the problem. I definitely think there are changes that need to be made to the HHS portal, but it is a good start and the changes only need to be incremental from there. </p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>According to data gathered by Recorded Future</p></div></div>]]></content:encoded></item><item><title><![CDATA[Avenging PowerShell to Stop Ransomware]]></title><description><![CDATA[Part 3 of a 3 Part Series]]></description><link>https://ransomwaresommelier.com/p/avenging-powershell-to-stop-ransomware</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/avenging-powershell-to-stop-ransomware</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Thu, 12 Oct 2023 17:46:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qiH-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>You can check out <a href="https://ransomwaresommelier.com/p/powershell-great-ransomware-tool">Part 1</a> and <a href="https://ransomwaresommelier.com/p/is-securing-powershell-a-lost-cause">Part 2</a> of the series here. </em></p><blockquote><p><em>Because if we can't protect the Earth, you can be damned well sure we'll avenge it.</em></p><p>&#8212; Tony Stark, Avengers</p></blockquote><p>In an ideal world all cyberattacks would be stopped at the point of attempted intrusion and all the safeguards discussed in Part 2 of this series (and other places) would prevent ransomware groups from ever using PowerShell in the network. Unfortunately, in security none of us get to live in an ideal world. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This means we are often chasing alerts after IABs or ransomware groups have managed to gain access. In this case, the goal is to limit the damage they can cause, find them in the network and stop them before they can steal data, encrypt files, jump to other networks and more. </p><p>Given the pervasiveness of PowerShell in ransomware attacks, hunting for signs of PowerShell can provide those breadcrumbs to root out malicious actors and stop them before they cause damage to your organization. But, how do you do that?</p><p>As with most things in security, it starts with building a baseline. If you understand what PowerShel traffic within your organization is supposed to look like, then it is easier to spot the anomalies and stop them (unless, as has happened more than a few times, there are already threat actors in your network while you are building the baseline). </p><p>Most organizations build their baseline by collecting and analyzing PowerShell logs, but it also helps to talk to the teams that are using PowerShell to find out why and how they use it. I&#8217;ve been in many networks where building the baseline uncovers PowerShell scripts that were running for years that no one knows who initiated them or why. These discussions can also lead to more efficient and secure uses of PowerShell internally and they absolutely improve communication so teams know to inform the security team when they run a new script or change existing scripts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qiH-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qiH-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 424w, https://substackcdn.com/image/fetch/$s_!qiH-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 848w, https://substackcdn.com/image/fetch/$s_!qiH-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 1272w, https://substackcdn.com/image/fetch/$s_!qiH-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qiH-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png" width="600" height="526.2362637362637" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1277,&quot;width&quot;:1456,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:202298,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qiH-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 424w, https://substackcdn.com/image/fetch/$s_!qiH-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 848w, https://substackcdn.com/image/fetch/$s_!qiH-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 1272w, https://substackcdn.com/image/fetch/$s_!qiH-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F64ff8507-a811-4062-ab2f-c748e6a7ba66_2999x2630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Another image that came up searching for &#8220;hacking cartoon.&#8221; I guess it works.</figcaption></figure></div><p>Once you have built your baseline, you want to find a way to understand how adversaries are using PowerShell. Understanding their behavior helps build detections. </p><p>So, for example this excellent report from <a href="https://unit42.paloaltonetworks.com/vice-society-ransomware-powershell/">Unit 42</a> shows Vice Society using ExecutionPolicy Bypass command:</p><p><code>powershell.exe -ExecutionPolicy Bypass -file \\[redacted_ip]\s$\w1.ps1</code></p><p>It turns out that the ExecutionPolicy Bypass command is <a href="https://www.gigasheet.com/post/powershell-threat-hunting-made-easy">commonly</a> used by a <a href="https://www.blackfog.com/fileless-powershell-protection/">number</a> of ransomware groups. </p><p>Another great example of how IABs and ransomware groups use PowerShell is to disable your security tools is in this report from <a href="https://www.kroll.com/en/insights/publications/cyber/royal-ransomware-deep-dive">Kroll</a>:</p><p><code>C:\Windows\system32\windowspowershell\v1.0\powershell.exe -Command Set-MpPreference -DisableRealtimeMonitoring $true</code></p><p>Your organization is most likely not using either of these commands (at least I hope not) so hunting for examples of them in PowerShell logs can find malicious ransomware activity early. </p><p>Some ransomware groups try to mask their activity by encoding their PowerShell commands by encoding the commands, as pointed out by <a href="https://redcanary.com/threat-detection-report/techniques/powershell/">RedCanary</a>:</p><p><code>powershell.exe -encod VwByAGkAdABlAC0ASABvAHMAdAAgACIAdAB3AGUAZQB0ACwAIAB0AHcAZQBlAHQAIQAiAA==</code></p><p>Their linked report includes methods for detecting the use of encoding in scripts. </p><p>These are three quick and relatively easy things you can look for in PowerShell logs that are usually signs of malicious activity. But, because you have built a baseline of PowerShell activity in your network, you can also start looking for anomalous traffic.</p><p>For example:</p><ul><li><p>Scripts running at odd times</p></li><li><p>Scripts executed by a new network admin (side note: ANY time a new admin account is created should automatically draw an alert).</p></li><li><p>Scripts running on or from machines that don&#8217;t normally run PowerShell scripts</p></li><li><p>Scripts engaging in unusual (or possibly any) network probing.</p></li></ul><p>Each organization is different and differs in how they use PowerShell. But if you have that baseline, and continuously update the baseline it is easier (not easy, easier) to find the oddities, flag them and stop a ransomware attack before it can do damage.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Edgar Allan Poe, Cryptography and Cryptocurrency]]></title><description><![CDATA[This post isn&#8217;t about ransomware, instead it is about Edgar Allan Poe&#8217;s fascination with cryptography.]]></description><link>https://ransomwaresommelier.com/p/edgar-allan-poe-cryptography-and</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/edgar-allan-poe-cryptography-and</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Fri, 06 Oct 2023 01:04:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M_8c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This post isn&#8217;t about ransomware, instead it is about Edgar Allan Poe&#8217;s fascination with cryptography. I promise we&#8217;ll return to ransomware soon.</em></p><p>Most people associate Edgar Allan Poe with horror: <em>The Raven</em>, <em>The Pit and the Pendulum</em>, and <em>The Masque of the Red Death </em>are all masterworks of horror that have been presented in every medium over the last 180 years. But, Poe was much more than horror writer, he also wrote detective stories, science fiction stories and he wrote about cryptography. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In fact, in his lifetime, one his most popular short stories was <a href="https://poestories.com/read/goldbug">The Gold-Bug</a>. A story about the hunt for buried pirate treasure in South Carolina that can only be found by solving a cryptogram:<br></p><p><code>53&#8225;&#8225;&#8224;305))6*;4826)4&#8225;.)4&#8225;);80</code></p><p><code>6*;48&#8224;8&#182;60))85;1&#8225;(;:&#8225;*8&#8224;83(88)</code></p><p><code>5*&#8224;;46(;88*96*?;8)*&#8225;(;485);5*&#8224;</code></p><p><code>2:*&#8225;(;4956*2(5*-4)8&#182;8*;40692</code></p><p><code>85);)6&#8224;8)4&#8225;&#8225;;1(&#8225;9;48081;8:8&#8225;1</code></p><p><code>;48&#8224;85;4)485&#8224;528806*81(&#8225;9;48</code></p><p><code>;(88;4(&#8225;?34;48)4&#8225;;161;:188;&#8225;?;</code></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M_8c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M_8c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 424w, https://substackcdn.com/image/fetch/$s_!M_8c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 848w, https://substackcdn.com/image/fetch/$s_!M_8c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!M_8c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M_8c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png" width="504" height="558.6923076923077" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1614,&quot;width&quot;:1456,&quot;resizeWidth&quot;:504,&quot;bytes&quot;:216000,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!M_8c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 424w, https://substackcdn.com/image/fetch/$s_!M_8c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 848w, https://substackcdn.com/image/fetch/$s_!M_8c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!M_8c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F941e79dc-0148-41db-b2d6-da9730646eaa_2707x3000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Which translates to:</p><p><code>A good glass in the bishop's hostel in the devil's seat forty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.</code></p><p>Interestingly, in Poe&#8217;s story solving the cryptogram wasn&#8217;t enough, the protagonist actually needed to understand the lay of the land in South Carolina to get to the treasure. </p><p>The Gold-Bug is what sparked my interest in cryptography at a young age, and I am not alone. While <a href="https://www.theatlantic.com/science/archive/2017/03/h3ll0-mr-pr3s1d3nt/521193/">Thomas Jefferson</a> is generally considered the &#8220;Father of Cryptography&#8221; (a VERY disputed <a href="https://www.google.com/search?q=the+father+of+cryptography+in+the+united+states">title</a>) in the United States, there is no doubt that Poe popularized the idea of cryptography for the masses (at least in the US). </p><p>In fact, in 1936 Chief Signal Officer (and other <a href="https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/friedman-documents/Friedman_Collection_Background.pdf">Father of American Cryptography</a>) William Friedman wrote:</p><blockquote><p>It is a curious fact that popular interest in this country in the subject of cryptography received its first stimulus from Edgar Allan Poe. Should a psychologic association test be made, the word &#8220;cipher&#8221; would doubtless bring from most laymen the immediate response, &#8220;Poe&#8221; or &#8220;The Gold Bug.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>&#8221;</p></blockquote><p>But, it wasn&#8217;t just The Gold Bug. Poe wrote a series of essays entitled <em><a href="https://www.eapoe.org/works/info/peswr.htm">Secret Writing </a></em>for <em>Graham&#8217;s Magazine. </em>He also a wrote a series of popular <em><a href="https://www.eapoe.org/works/editions/mawm001c.htm">cryptograms</a></em> for t<em>he Alexander's Weekly Messenger.</em></p><p>In short, as early as the 1840s, Poe had people thinking about cryptography, how to use and challenging them to solve these puzzles. </p><p>Friedman spends most of his <a href="https://www.jstor.org/stable/2919837">essay</a> trashing Poe&#8217;s cryptography skills, referring to Poe as a &#8220;tyro&#8221; (beginner or novice) and goes on to compare him to a &#8220;conjurer&#8221; and even mocks Poe&#8217;s preferred cryptogram, the Berryer.</p><p>But, there is one thing I think Friedman gets wrong. He quotes Poe from the <em><a href="https://www.eapoe.org/works/harrison/jah14e10.htm">Graham&#8217;s</a></em><a href="https://www.eapoe.org/works/harrison/jah14e10.htm"> </a>essay:</p><blockquote><p>Few persons can be made to believe that it is not quite an easy thing to invent a method of secret writing which shall baffle investigation. Yet it may be roundly asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.</p></blockquote><p>The funny thing is, other than possibly OTP&#8217;s, most modern cryptologists believe that there isn&#8217;t a a cipher that can be written than can&#8217;t be solved, with enough resources. In fact, even though Poe couldn&#8217;t predict that Charles Babbage <a href="https://crypto.interactive-maths.com/vigenegravere-cipher.html">would break</a> Le Chiffre Ind&#233;chiffrable - what was then considered an indecipherable code - in 1854 Friedman knew that had been accomplished and still felt it was possible to create an unbreakable cipher. </p><div><hr></div><h2>Hey! Get to the Cryptocurrency Part</h2><p>What does all of this have to do with Cryptocurrency you ask? In 1849 Poe wrote in a letter to Evert Duyckinck:</p><blockquote><p>If you have looked over the Von Kempelen article which I left with your brother, you will have fully perceived its drift. I mean it as a kind of "exercise," or experiment, in the plausible or verisimilar style. Of course there is not one word of truth in it from beginning to end. I thought that such a style, applied to the gold-excitement, could not fail of effect.</p></blockquote><p>If you aren&#8217;t familiar with Poe&#8217;s article, <em>Von Kempelen and His Discovery</em>, it is an article published in April of 1849 in the magazine <em>Flag of Our Union</em> about a German scientist who found a way to turn lead into gold, raising the price of lead by 200% in Europe. The article is fictional, but there is no indication in the article that is such (similar to the way often people think War of the Worlds was originally <a href="https://www.smithsonianmag.com/history/infamous-war-worlds-radio-broadcast-was-magnificent-fluke-180955180/">broadcast on radio</a>).</p><p>We have to remember that Poe was a writer of his time. According to Terence Whalen<br> in his paper. The Code for Gold: Edgar Allan Poe and Cryptography, that time consisted of alchemists trying to turn lead into gold and the move from gold and silver as primary forms of currency to bank notes:</p><blockquote><p>In Money, Language, and Thought, Marc Shell offers a major reinterpretation of "The Gold-Bug" based upon the correspondence between the events of the story and the general economic context. "At a time," writes Shell, "when alchemists were trying to transform tin into gold by means of alchemy and financiers were turning paper money into gold by means of the newly widespread institution of paper money, Edgar Allan Poe was a poor author who could only wish to exchange his literary papers for money.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p></blockquote><p>The Gold Bug was written at a time of uncertainty about the changing nature of money. A time when a lot of con-men were offering solutions that weren&#8217;t real but there also wasn&#8217;t much trust in existing financial institutions. </p><p>Whalen, boils the essence of The Gold Bug down to this:</p><blockquote><p>The treasure chest, which contains "no American money,&#8221; further indicates the central exchange of the story: not paper for paper, but <strong>code for gold</strong>.</p></blockquote><p>My emphasis added.</p><p>The Gold Bug is readily available online (it is also available in <a href="https://www.ebay.com/itm/304418823250">comic book form</a>, which is how I first read it), I&#8217;d recommend reading (or re-reading) it and you can start to pick out the similarities between Poe&#8217;s time and ours, and how the story could easily be released today as an allegory for cryptocurrency. </p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Friedman, William F. &#8220;Edgar Allan Poe, Cryptographer.&#8221; American Literature, vol. 8, no. 3, 1936, pp. 266&#8211;80. JSTOR, https://doi.org/10.2307/2919837. Accessed 5 Oct. 2023.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Whalen, Terence. &#8220;The Code for Gold: Edgar Allan Poe and Cryptography.&#8221; Representations, no. 46, 1994, pp. 35&#8211;57. JSTOR, https://doi.org/10.2307/2928778. Accessed 5 Oct. 2023.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Is Securing PowerShell a Lost Cause?]]></title><description><![CDATA[Part 2 of a 3 Part Series]]></description><link>https://ransomwaresommelier.com/p/is-securing-powershell-a-lost-cause</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/is-securing-powershell-a-lost-cause</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Wed, 27 Sep 2023 19:41:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!59p5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Check out Part 1 of this series <a href="https://ransomwaresommelier.com/p/powershell-great-ransomware-tool">here</a>.</em></p><p>Before I begin, I have to thank <a href="https://www.fiverr.com/loonhart">Helen</a> for the cool new email banner. Ransomware is such a serious topic that it is nice to be able to inject some fun into it when we can.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Speaking of serious topics: PowerShell and Ransomware. We know that initial access brokers and ransomware operators love to use PowerShell during their attacks, so how can organizations better secure it? </p><p>Alternatively, should organizations try to secure it or just remove it all together? In their guidance on securing PowerShell both <a href="https://devblogs.microsoft.com/powershell/defending-against-powershell-attacks/">Microsoft</a> and the <a href="https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/1/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF">NSA/CISA/GCSB/GCHQ</a> [PDF] all suggest that removing PowerShell is the wrong answer. It is better to secure it than to remove entirely, especially because so many security and incident response tools rely on PowerShell. </p><p>I don&#8217;t disagree with this guidance, but I do think it is a bit out of date. For example, in the Microsoft recommendation for client systems <a href="https://devblogs.microsoft.com/powershell/defending-against-powershell-attacks/">they state</a>:</p><blockquote><p>Client systems. After initial infection (by a macro-enabled document or user double-clicking a malicious executable), malware sometimes uses PowerShell as one component of its attack chain. Microsoft&#8217;s recommendation is not to block PowerShell completely, as PowerShell is required for many operating system and system management tasks. Microsoft&#8217;s recommendation is to limit PowerShell to authorized users and administrators to mitigate the use by commodity malware, as described by point #4 above (&#8220;Deploy Device Guard / Application Control Policies&#8221;). If Windows Defender Application Control is not an option, security products that block PowerShell from unknown parent processes (such as Word, Excel) are a reasonable middle ground.</p></blockquote><p>Here is my problem with this advice, &#8220;<strong>&#8230;limit PowerShell to authorized users and administrators&#8230;</strong>&#8221; In theory, this works, but we know that in every ransomware attack the attack attempts to <a href="https://www.cert.govt.nz/it-specialists/guides/how-ransomware-happens-and-how-to-stop-it/lifecycle-of-a-ransomware-attack-consolidation-and-preparation/">gain administrative access</a>, which means that they will easily be able to bypass whatever restrictions are in place. You could make the argument that it is harder to gain administrative access if PowerShell is restricted, but tools like <a href="https://www.techtarget.com/searchsecurity/tutorial/Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials">Mimikatz</a> don&#8217;t require PowerShell to run. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!59p5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!59p5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!59p5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!59p5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!59p5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!59p5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:863470,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!59p5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!59p5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!59p5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!59p5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b447ac-91d9-4587-afc2-c7f3e6654937_3000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Not sure this is how phone hacking works&#8230;but what do I know?</figcaption></figure></div><p>This also means that organizations have to do a better job of managing least privilege across their Active Directory installation, including not giving everyone in the organization local Admin access (PLEASE, PLEASE, PLEASE DO THIS).</p><p>I understand the complications involved in removing PowerShell from client systems. But for organizations that can, it might be the easiest solution. I am going to turn on comments for this post, I would love to hear what you think.</p><p>Assuming you can&#8217;t remove PowerShell from client workstations, then the advice to restrict who can use PowerShell is good advice but, again, it also means you have to have strong identity and access management policies, which too many organizations do not. </p><p>Microsoft also recommends enabling <a href="https://learn.microsoft.com/en-us/powershell/scripting/learn/application-control?view=powershell-7.3">Windows Defender Application Control</a> (or its equivalent in other EDRs) and using that to restrict which programs can execute PowerShell. They recommend that only signed applications should be able to execute PowerShell and also to block commonly used phishing vectors, such as Microsoft Word, from executing PowerShell as well. Again, this feels like outdated advice, we&#8217;ve seen a number of attacks where cybercriminals used stolen keys to sign their malware, so it looked like a valid application. </p><p>The alternative, of course, is to create an &#8220;allow list.&#8221; Only applications on that list would be able to execute PowerShell scripts, everything else would be blocked by default. </p><p>So, now an organization has to not only have excellent IAM policies, but also application management policies as well. Which, honestly, most organizations, especially larges ones, should have in place &#8212; but too many do not. </p><p>Finally, both Microsoft and the Government(s) Bulletin above recommend enabling <a href="https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.3">PowerShell Logging</a>. I think this is a critical component to good PowerShell security and it is what I am going to focus on for Part 3 of this series. In short, good log analysis can help overcome a lot of the weaknesses associated with the other suggestions for securing PowerShell.</p><p>But, effective PowerShell logging requires good asset management. You have to ensure that you know that you are collecting logs from every systems that is running PowerShell. You also have to know what/where that system is when an alert is generated and be able to respond to the alert quickly. </p><p>In short, effective PowerShell security requires good:</p><ul><li><p>Identity and Access Management</p></li><li><p>Application Control</p></li><li><p>Asset Management </p></li><li><p>Vulnerability Management (you have to keep PowerShell itself  <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-84966/Microsoft-Powershell.html">patched</a>.</p></li></ul><p>So, essentially, good PowerShell security requires all of the usual good security practice recommendations &#8212; go figure. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[100 Subscribers!]]></title><description><![CDATA[Today this silly little ransomware blog surpassed 100 subscribers.]]></description><link>https://ransomwaresommelier.com/p/100-subscribers</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/100-subscribers</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Thu, 21 Sep 2023 00:33:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vivC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vivC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vivC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vivC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vivC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vivC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vivC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg" width="1456" height="848" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:534973,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vivC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vivC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vivC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vivC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa543764b-55bf-4fa1-99d0-9edde8330e18_2998x1746.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Today this silly little ransomware blog surpassed 100 subscribers. This may not seem like a big deal, especially since the blog is more than 2 years old. But, given my lack of marketing and inconsistent posting schedule, it is a big and (to me) surprising accomplishment. </p><p>Thank you all for your continued support!</p>]]></content:encoded></item><item><title><![CDATA[PowerShell: Great Ransomware Tool or Greatest Ransomware Tool?]]></title><description><![CDATA[Part 1 of a 3 Part Series]]></description><link>https://ransomwaresommelier.com/p/powershell-great-ransomware-tool</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/powershell-great-ransomware-tool</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Tue, 19 Sep 2023 14:31:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uvtC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It is almost impossible to talk about ransomware attacks without talking about PowerShell. The use of PowerShell is <a href="https://www.thestack.technology/powershell-use-for-ransomware/">ubiquitous in ransomware</a> campaigns at almost all phases of attack from initial access, to network scanning, to data theft and even encryption. </p><p>This is the first of a 3 part series. In this post I am going to go over how IABs and Ransomware operators use PowerShell during attacks. The next post will cover how to limit access to PowerShell in your network and the 3rd post will cover how to threat hunt for malicious PowerShell usage.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uvtC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uvtC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 424w, https://substackcdn.com/image/fetch/$s_!uvtC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 848w, https://substackcdn.com/image/fetch/$s_!uvtC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!uvtC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uvtC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png" width="1456" height="932" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:932,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:375556,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uvtC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 424w, https://substackcdn.com/image/fetch/$s_!uvtC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 848w, https://substackcdn.com/image/fetch/$s_!uvtC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!uvtC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F107872a5-79ad-4a54-93b5-370e3b2876eb_3000x1920.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Why does this malware have an umbrella? Image credit JulsIst</figcaption></figure></div><p>The use of PowerShell starts with initial access. For example, Palo Alto&#8217;s Unit 42 documented <a href="https://x.com/unit42_intel/status/1689645377027457027">IcedID&#8217;s use of PowerShell</a> during the installation phase. After a victim downloads the trojanized malware it executes a PowerShell script to download the IcedID loader. </p><p>The Ukraine Cert documents the use of PowerShell during <a href="https://cert.gov.ua/article/4755642">the installation of SmokeLoader</a>. The installation includes a JavaScript file that uses a PowerShell script to download the malicious executable. </p><p>On the ransomware operator side, CISA reports that the BianLian ransomware group uses PowerShell to <a href="https://www.cisa.gov/sites/default/files/2023-05/aa23-136a_stopransomware_bianlian_ransomware_group_1.pdf">disable security tools</a> using the following code:</p><pre><code><em>[Ref].Assembly.GetType(&#8216;System.Management .Automation.AmsiUtils&#8217;).GetField(&#8216;amsiInitFaile d&#8217;,&#8217;NonPublic,* Static&#8217;).SetValue($null,$true)</em></code></pre><p>Unit 42 also documents how Vice Society used a PowerShell script to automate the process of <a href="https://unit42.paloaltonetworks.com/vice-society-ransomware-powershell/">exfiltrating files</a> from victim networks. </p><p>LockBit has also used PowerShell to distribute and <a href="http://www.hackdig.com/12/hack-861639.htm">execute their ransomware payload</a>. The team at Packt does a nice job of <a href="https://security.packt.com/lockbit-3-0-a-deeper-look/">documenting those LockBit scripts</a>. </p><p>While these examples are specific to these ransomware groups, the reality is that many different groups use PowerShell to carry out the same tasks and more. Securing PowerShell in your network and hunting for malicious used of PowerShell can go a long way to protect you from ransomware attacks. I&#8217;ll talk more about how to do that in the next two posts. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[You. Are. The. Criminal. Dumbass.]]></title><description><![CDATA[Thoughts on ALPHV/BlackCat's Reaction to Caesars and MGM Ransomware Attack]]></description><link>https://ransomwaresommelier.com/p/you-are-the-criminal-dumbass</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/you-are-the-criminal-dumbass</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Fri, 15 Sep 2023 01:44:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!i0tz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This afternoon the operator of the ALPHV / BlackCat ransomware group <a href="http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/ddcdd476-fbd9-4809-baea-414d820c9d4b">posted a long, rambling update</a> on the MGM ransomware attack. Similar to many of these ransomware manifestos this one is self-indulgent and full of faux indignation. This, of course, completely ignores the fact that they are the criminals here, they broke into the networks, stole data, locked systems and are threatening to leak sensitive data unless MGM pays their extortion demands. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i0tz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i0tz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 424w, https://substackcdn.com/image/fetch/$s_!i0tz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 848w, https://substackcdn.com/image/fetch/$s_!i0tz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 1272w, https://substackcdn.com/image/fetch/$s_!i0tz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i0tz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png" width="462" height="529.9038461538462" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1670,&quot;width&quot;:1456,&quot;resizeWidth&quot;:462,&quot;bytes&quot;:346143,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i0tz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 424w, https://substackcdn.com/image/fetch/$s_!i0tz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 848w, https://substackcdn.com/image/fetch/$s_!i0tz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 1272w, https://substackcdn.com/image/fetch/$s_!i0tz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2121630-a8fb-457d-8913-3d50aa1c1e37_2615x2999.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>It starts right from the beginning:</p><blockquote><p>We have made multiple attempts to reach out to MGM Resorts International, "MGM". As reported, MGM shutdown computers inside their network as a response to us. We intend to set the record straight.</p></blockquote><p>Are you upset that MGM didn&#8217;t want to talk to criminals? No one owes your criminal-ass a response.</p><blockquote><p>After waiting a day, we successfully launched ransomware attacks against more than 100 ESXi hypervisors in their environment on September 11th after trying to get in touch but failing. This was after they brought in external firms for assistance in containing the incident.</p></blockquote><p>Again, they are upset that the incident responders didn&#8217;t want to talk to criminals. What were you going to do if they got in touch with you? Go home, quietly? Stop the attack? These were people trying to defend their network, they didn&#8217;t have the time to deal with scumbags like you. </p><blockquote><p>The user has consistently been coming into the chat room every several hours, remaining for a few hours, and then leaving. About seven hours ago, we informed the chat user that if they do not respond by 11:59 PM Eastern Standard Time, we will post a statement. Even after the deadline passed, they continued to visit without responding. We are unsure if this activity is automated but would likely assume it is a human checking it.</p></blockquote><p>Again, no one owes you a response, no matter what arbitrary deadline you set. Also, you don&#8217;t like it when someone intrudes onto your infrastructure and lurks around doing who knows what? Maybe you should secure your infrastructure better.</p><blockquote><p>We are unable to reveal if PII information has been exfiltrated at this time. If we are unable to reach an agreement with MGM and we are able to establish that there is PII information contained in the exfiltrated data, we will take the first steps of notifying Troy Hunt from HaveIBeenPwned.com. He is free to disclose it in a responsible manner if he so chooses.</p></blockquote><p>Reach an agreement? You mean extort. You are criminals, you don&#8217;t reach agreements, you extort victims. </p><blockquote><p>We believe MGM will not agree to a deal with us. Simply observe their insider trading behavior. You believe that this company is concerned for your privacy and well-being while visiting one of their resorts?</p></blockquote><p>Again, it is not a deal. You are extortionists, you extort victims you don&#8217;t &#8220;make deals.&#8221;</p><blockquote><p>We recognize that MGM is mistreating the hotel's customers and really regret that it has taken them five years to get their act together. Other lodging options, including casinos, are undoubtedly open and happy to assist you.</p></blockquote><p>Victim blaming is also a common tactic among ransomware groups. MGM is not mistreating their customers, you are disrupting their infrastructure, and disruption to their customers is entirely YOUR FAULT. This is like a bank robber complaining that a bank couldn&#8217;t service customers while everyone in the bank was being held at gun point. It is ridiculous on its face. </p><blockquote><p>We still continue to have access to some of MGM's infrastructure. If a deal is not reached, we shall carry out additional attacks. We continue to wait for MGM to grow a pair and reach out as they have clearly demonstrated that they know where to contact us.</p></blockquote><p>MGM has proved they &#8220;grew a pair&#8221; by not talking to you and not negotiating with criminal scumbags like yourselves. And once again, IT IS NOT A DEAL, you are criminal scumbags and you need to accept that good organizations don&#8217;t want to deal with you. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[10PM. Do You Know Where Your Data Are (Is)?]]></title><description><![CDATA[Monitoring your data supply chain, before you wind up on an extortion site...]]></description><link>https://ransomwaresommelier.com/p/10pm-do-you-know-where-your-data</link><guid isPermaLink="false">https://ransomwaresommelier.com/p/10pm-do-you-know-where-your-data</guid><dc:creator><![CDATA[Allan Liska]]></dc:creator><pubDate>Sun, 27 Aug 2023 15:45:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1RoW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1RoW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1RoW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1RoW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1RoW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1RoW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1RoW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:472351,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1RoW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1RoW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1RoW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1RoW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6efe0ef-1241-4032-89fa-b641cdc398f2_1920x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>From the late 1960s well into the 1980s there was an often mocked <a href="https://www.remindmagazine.com/article/4083/its-10pm-do-you-know-where-your-children-are/">Public Service Announcement</a> that would run just before the 10:00 PM News. The spot was just a <a href="https://www.youtube.com/watch?v=PTCrgovX3mc">few seconds long</a>, showed the above (original) graphic and the iconic phrase was spoken in a deep baritone voice. </p><p>This was in a time when kids were, generally, able to play more freely, usually &#8220;until the <a href="https://www.youtube.com/watch?v=_fFqcnuWam0">street lights</a> came on.&#8221; And it was supposed to serve as a reminder that parents should know where there kids are. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The same message can be applied to our data today. We all got a start reminder this week when <a href="https://www.theregister.com/2023/08/23/ransomware_wipes_cloudnordic/">CloudNordic was the victim</a> of a ransomware attack that included not only their customer data, but secondary and tertiary backups. This means that all customer data is, effectively, unrecoverable. Especially since CloudNordic is doing the right thing and refusing to pay the ransom. </p><p>But, the truth is, we have been reminded of this all summer thanks to Cl0p&#8217;s MoveIT breach. According to <a href="https://techcrunch.com/2023/08/25/moveit-mass-hack-by-the-numbers/">TechCrunch</a>, more than 1000 victims have been announced and more than 60 million victims have had data exposed in this breach. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jywm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jywm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 424w, https://substackcdn.com/image/fetch/$s_!jywm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 848w, https://substackcdn.com/image/fetch/$s_!jywm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 1272w, https://substackcdn.com/image/fetch/$s_!jywm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jywm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png" width="1456" height="2189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2189,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2171408,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jywm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 424w, https://substackcdn.com/image/fetch/$s_!jywm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 848w, https://substackcdn.com/image/fetch/$s_!jywm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 1272w, https://substackcdn.com/image/fetch/$s_!jywm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f5e20ec-a8c6-417d-a55e-630ae2e8484b_2086x3136.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We all need to get better at monitoring our <a href="https://hbr.org/2021/06/data-management-is-a-supply-chain-problem">data supply chain</a>. If asset management is a challenge for many organizations, then data management is a nightmare. Asset management is almost always a function of IT, but every part of an organization creates and manages data. On top of that much of the data created in a modern organization is outsourced to second, third and fourth parties. </p><p>This means, as many companies are finding out from Cl0p&#8217;s MoveIT attack, that even if you do everything correctly if one of your supplier&#8217;s suppliers is hit with a ransomware or data theft attack it could leave your company exposed. </p><p>Levi Gundert talks about these challenges of monitoring and managing <a href="https://intelligence2risk.substack.com/p/from-direct-to-distant-the-challenge">third and fourth party risk in this post</a>. With data extortion increasingly important to ransomware groups (and many testing out the data extortion only model), knowing where your data is being stored, how it is being protected and planing for what to do if that data is exposed is important for all organizations to consider. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://ransomwaresommelier.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ransomware! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>