Karakurt Extortion Group Auctions Data for Ransom

Robinson+Cole Data Privacy + Security Insider

On June 2, 2022, CISA (the Cybersecurity and Infrastructure Security Agency), the FBI, the Department of the Treasury and the Financial Crimes Enforcement Network issued a joint Cybersecurity Alert warning companies of the Karakurt Team/Karakurt Lair extortion group, which has “employed a variety of tactics, techniques, and procedures (TTPs), creating significant challenges for defense and mitigation.” According to the Alert, the group does not encrypt data for ransom, but instead steals data, then threatens to auction it off or release it to the public for ransoms ranging from $25,000 to $13,000,000 in Bitcoin.

Not only does Karakurt threaten to auction off the data or release it publicly like many ransomware groups, but it also has contacted victims’ employees, business partners, and clients with harassing emails and phone calls to pressure the victims to cooperate. The emails have contained examples of stolen data, such as social security numbers, payment accounts, and private company emails, as well as sensitive business data belonging to employees or clients. Upon payment of ransoms, Karakurt actors have provided some form of proof of deletion of the files and, occasionally, a brief statement explaining how the initial intrusion occurred.

According to the Alert, as of May 2022, Karakurt’s website “contained several terabytes of data purported to belong to victims across North America and Europe, along with several ‘press releases’ naming victims who had not paid or cooperated, and instructions for participating in victim data ‘auctions.’”

The methods used by Karakurt to obtain access to devices include:

  • Purchasing stolen login credentials
  • Cooperation with other cybercriminals who provide access to compromised company networks
  • Buying access to already compromised data through “third-party intrusion broker networks”

The intrusions exploit software vulnerabilities such as Log4j or outdated versions of software, and phishing and spearphishing campaigns.

The Alert and mitigation steps can be accessed here.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Robinson+Cole Data Privacy + Security Insider | Attorney Advertising

Written by:

Robinson+Cole Data Privacy + Security Insider

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.