Miami Herald

Ukraine police seize cash in raids on ransomware gang

- BY JIM HEINTZ AND FRANK BAJAK

Ukrainian police have carried out nearly two dozen raids targeting alleged associates of a Russian-speaking ransomware gang it blamed for a half billion dollars in cyberattac­ks and extortion that hit the United States and South Korea especially hard.

A police statement on Wednesday said 21 raids were conducted on the homes of suspects affiliated with the Clop ransomware syndicate in Kyiv and elsewhere, with computer equipment and about $185,000 in cash seized.

Six defendants carried out attacks on U.S. and Korean companies — for which they face up to eight years in prison for violating computer crime and money-laundering laws, the statement said. It did not say whether any suspects were detained, and said the investigat­ion was ongoing. The Clop dark web leak site remained online hours after the raids were announced, suggesting the gang’s internet infrastruc­ture might still be intact.

The most potent ransomware gangs operate with Kremlin tolerance, based out of reach of Western law enforcemen­t. Russia neither prosecutes not extradites them. Trying to persuade its president, Vladimir Putin, to change that was a priority of U.S. President Joe Biden in their meeting Wednesday in Geneva. It’s not clear whether Biden made any headway.

Video posted by the Ukrainian police showed Korean police taking part in this week’s raids, where cash, cell phones and cars were also seized. The police statement said four Korean companies hit by the gang with the ransomware — which scrambles data that can only be unlocked with a software key obtained by paying the criminals — had paid ransoms. It said the gang targeted U.S. universiti­es, including Stanford Medical School and the University of Maryland.

Wednesday’s raid “is a continuati­on of the much more aggressive posture that law enforcemen­t has taken against ransomware gangs this year,” said analyst Allan Liska of the cybersecur­ity firm Recorded Future. “It really does feel like law enforcemen­t has figured out how to attack the ransomware scourge, and hopefully, will slow down the attacks.”

After last month’s attack on the Colonial Pipeline affected fuel shipments to the U.S. East Coast, the White House began taking ransomware criminals as seriously as it does terrorists, and many are now lying low. The author of the Colonial attack went into hiding and a different group, Avaddon, suddenly announced its retirement. Cybersecur­ity analysts caution, however, that such retirement­s are not new and can be a ruse to thwart law enforcemen­t while the criminals reconstitu­te and create new products with different brands.

And while some arrests have been made and ransomware infrastruc­ture disabled in recent months, no kingpins have been snared.

Clop is among the more prolific ransomware gangs, known for extorting victims by threatenin­g to publish data stolen from them. It has published the names of 65 victims to its dark web extortion site since August, said Liska.

In some cases, Clop has extorted victims with data it may not have obtained directly but purchased instead from third party cyberthiev­es. It’s what security researcher­s suspect happened in the case of the Universiti­es of Colorado and Miami, the rail transport company CSX Corp., the Kroger grocery and pharmacy chain, the Canadian aircraft maker Bombardier and the prominent law firm Jones Day.

Newspapers in English

Newspapers from United States