DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack

Colonial Pipeline might be tight-lipped about the vulnerability hackers exploited to launch a ransomware attack that shut down the U.S.’s largest pipeline, but details are emerging about the DarkSide ransomware variant behind the attack and the cybercriminals associated with it.

A relative newcomer, the variant first emerged in the cybercriminal underground last year and quickly rose to prominence. “While spotted in the wild as far back as August 2020, DarkSide’s developer ‘debuted’ the ransomware on the popular Russian-language hacker forum XSS in November 2020, advertising that he was looking for partners in an attempt to adopt an affiliate ‘as-a-service’ model,” according to Intel471 researchers, who have been tracking cybercriminals linked to the variant since its emergence.

DevOps Connect:DevSecOps @ RSAC 2022

The researchers then spotted the ransomware in attacks on manufacturers and law firms in the U.S. and Europe. In March, the variant’s developer tried to lure new affiliates with a bevy of new features, Intel471 said, including versions aimed at Microsoft Windows and Linux systems. They also sported enhanced encryption settings and “a full-fledged and integrated feature built directly into the management panel that enabled affiliates to arrange calls meant to pressure victims into paying ransoms” as well as a way to launch distributed denial-of-service (DDoS) attacks.

Many of the affiliates gained access to networks – at least initially – through vulnerable software like Citrix, Remote Desktop Web (RDWeb) or via remote desktop protocol (RDP), then performed lateral movement and exfiltrated sensitive data before they deployed ransomware.

“For initial access to networks, actors usually purchased access credentials on underground forums, conducted brute-force attacks, used spam campaigns to spread malware loaders and/or bought access to popular botnets such as Dridex, TrickBot and ZLoader,” Intel471 researchers said. “As for post-exploitation tools, the arsenal usually included Cobalt Strike and Metasploit frameworks, Mimikatz and BloodHound.”

The researchers called out some tactics, techniques and procedures used by DarkSide affiliates, including a prominent actor partnering with network access brokers to obtain initial access credentials by using the Mega.nz file-sharing service to exfiltrate data, then leveraging a PowerShell backdoor “for reconnaissance and persistence within corporate networks, and also operating the KPOT.”

In another instance, an actor tapped pen testers “to use VPNs in conjunction with already-obtained network access, allowing attackers to move laterally within the network, exfiltrate sensitive data and deploy ransomware,” Intel471 said.

After the FBI fingered DarkSide in the Colonial Pipeline attack and President Biden’s keen interest in the incident, the ransomware’s operators tried to turn down the heat by making a statement pledging to “introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future.” The consequences of the pipeline attack are reverberating across the Eastern half of the U.S. in the form of higher gas prices and shortages.

It’s certainly easy to understand why the group doesn’t want to invite the wrath of the federal government. But how likely is that Given the group’s reputation as a criminal enterprise, not a nation-state actor, what will the authorities do? It’s true that law enforcement may come knocking at some point, but more cybercriminals slip through law enforcement’s grip than get caught and punished.

DarkSide operators’ rise to prominence – in such a short time – and their packaging and shaping of features to lure affiliates underscore what Intel471 sees as “the popularity and increasing maturity of the ransomware-as-a-service model.” Aging technology controlling energy systems are prime targets for actors armed with RaaS. Their success only inspires others to join in the fun. There’s plenty of room in the cybercrime underground for the likes of access brokers, credential shops and bulletproof hosting providers.

All the more reason why companies responsible for critical infrastructure, Intel471 researchers said, must stand up and bolster the security of their systems. It’s a little late for Colonial Pipeline, which now finds itself in a reactive crouch. But those that take the lessons of this attack to heart and respond accordingly have the opportunity to assume a more proactive posture.

Featured eBook
Managing the AppSec Toolstack

Managing the AppSec Toolstack

The best cybersecurity defense is always applied in layers—if one line of defense fails, the next should be able to thwart an attack, and so on. Now that DevOps teams are taking  more responsibility for application security by embracing DevSecOps processes, that same philosophy applies to security controls. The challenge many organizations are facing now ... Read More
Security Boulevard

Teri Robinson

From the time she was 10 years old and her father gave her an electric typewriter for Christmas, Teri Robinson knew she wanted to be a writer. What she didn’t know is how the path from graduate school at LSU, where she earned a Masters degree in Journalism, would lead her on a decades-long journey from her native Louisiana to Washington, D.C. and eventually to New York City where she established a thriving practice as a writer, editor, content specialist and consultant, covering cybersecurity, business and technology, finance, regulatory, policy and customer service, among other topics; contributed to a book on the first year of motherhood; penned award-winning screenplays; and filmed a series of short movies. Most recently, as the executive editor of SC Media, Teri helped transform a 30-year-old, well-respected brand into a digital powerhouse that delivers thought leadership, high-impact journalism and the most relevant, actionable information to an audience of cybersecurity professionals, policymakers and practitioners.

teri-robinson has 117 posts and counting.See all posts by teri-robinson