ThreatLocker
  • Home
  • News
  • Security
  • Ransomware gangs have leaked the stolen data of 2,100 companies so far

Ransomware gangs have leaked the stolen data of 2,100 companies so far

  • May 8, 2021
  • 10:23 AM
  • 1

Data Leak hose

Since 2019, ransomware gangs have leaked the stolen data for 2,103 companies on dark web data leaks sites.

When modern ransomware operations began in 2013, the attacker's goal was to encrypt as many companies as possible and then demand a ransom payment for a decryptor.

Since the beginning of 2020, ransomware operations began conducting a new tactic called double-extortion.

Double-extortion is when ransomware operations steal unencrypted files before encrypting a network. The attackers then threaten to publicly release the stolen files on dark web data leak sites if a ransom is not paid.

Between the threat of not recovering their encrypted files and the additional concerns of data breaches, government fines, and lawsuits, threat actors are banking on the idea that this would force victims to more readily pay a ransom.

34 ransomware gangs leak data on the dark web

A dark web security researcher known as DarkTracer has been keeping track of the data leak sites for thirty-four ransomware gangs and told BleepingComputer that they have now leaked the data for 2,103 organizations.

The 34 ransomware gangs followed by DarkTracer are Team Snatch, MAZE, Conti, NetWalker, DoppelPaymer, NEMTY, Nefilim, Sekhmet, Pysa, AKO, Sodinokibi (REvil), Ragnar_Locker, Suncrypt, DarkSide, CL0P, Avaddon, LockBit, Mount Locker, Egregor, Ranzy Locker, Pay2Key, Cuba, RansomEXX, Everest, Ragnarok, BABUK LOCKER, Astro Team, LV, File Leaks, Marketo, N3tw0rm, Lorenz, Noname, and XING LOCKER.

Of these thirty-four operations, the top five active operations are Conti (338 leaks), Sodinokibi/REvil (222 leaks), DoppelPaymer (200 leaks), Avaddon (123 leaks), and Pysa (103 leaks).

Three groups that are no longer active and have more leaks than some of those in the top five are Maze (266 leaks) and Egregor (206 leaks).

The data for all the ransomware gang's data leak sites are represented in the chart below created by DarkTracer from May 4th, 2021.

Who is King of Ransomware on the Dark Web?
Who is King of Ransomware on the Dark Web?
Source: DarkTracer

Some of the listed ransomware gangs are no longer in operation, such as NetWalker, Sekhmet, Egregor, Maze, Team Snatch, or rebranded to a new name, such as NEMTY and AKO.

The data-extortion industry has become a significant money-maker for ransomware gangs who have told BleepingComputer that victims worry more about their data being leaked than the loss of encrypted files.

Other threat actors are seeing this trend and have begun launching new data leak marketplaces over the past couple of months that exist solely to sell stolen data.

While it may seem better to pay a ransom to prevent a data leak, there is no guarantee that the data won't be released or sold to other threat actors. 

Therefore, if your data is stolen, you are better off treating it as a data breach and being transparent about it to those who are affected.

article image

99% of What Mythos Found Is Still Unpatched.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot

Related Articles:

Trigona ransomware attacks use custom exfiltration tool to steal data

Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks

US ransomware negotiators get 4 years in prison over BlackCat attacks

US cybersecurity experts plead guilty to BlackCat ransomware attacks

Broken VECT 2.0 ransomware acts as a data wiper for large files

Lawrence Abrams
Lawrence Abrams is the owner and Editor in Chief of BleepingComputer.com. Lawrence's area of expertise includes Windows, malware removal, and computer forensics. Lawrence Abrams is a co-author of the Winternals Defragmentation, Recovery, and Administration Field Guide and the technical editor for Rootkits for Dummies.

Comments

Post a Comment Community Rules
You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Login

Reporter

Help us understand the problem. What is going on with this comment?

Read our posting guidelinese to learn what content is prohibited.

SUBMIT