Jump to content

Company Pretends to Decrypt Ransomware But Just Pays Ransom

SupremeGOAT

Ramsomware has created "jobs" for malware devs and security "specialists" alike. The saying "Prevention is better than cure" has never been more true in this case.

Quote

 

Researchers from leading cybersecurity vendor Check Point have uncovered a Russian IT consultancy named Dr. Shifro (http://www.dr-shifro.ru/) that claims to unlock and recover consumers’ and businesses’ encrypted files. But in fact, the company simply pays the ransomware’s creator themselves and passes the cost onto the victim at a 75%-plus profit margin.

 

Dr. Shifro offers only one service – helping ransomware victims unlock their files. It claims to be able to unlock files scrambled by the Dharma/Crisis ransomware (for which no decryption key is available), among others, which is suspicious. This caused the Check Point researchers to investigate.

They found that Dr. Shifro was actually making contact with the ransomware’s creator themselves and making a deal to unlock the victim’s files in return for the ransom payment (in the case the researchers followed, $1300). Dr. Shifro then passes that cost on to the victim, with their own fee charged on top (another $1000).

 

The researchers found correspondence between Dr. Shifro and a ransomware creator which shows how Dr. Shifro’s ‘consultancy’ works. By connecting directly with the threat actor to collect the decryption key, in return for payment, Dr. Shifro simply acts as a broker between victim and attacker

I'm not sure if this was originally in Russian and then roughly translated but this is the correspondence that was found.

 

“I’m an intermediary. We redeem keys for clients since 2015 on a regular basis. Send bitcoins tight, don’t ask dumb questions. Clients frequently addressed under recommendation. Could you give a discount to 0.15 btc?” 

 

Well at least he is trying get a discount eh? maybe that will markdown the markup? lol this the next bit is from BleepingComputers.com 

 

Shifro_business_model.png

Quote

The researchers say that the revenue from this type of activity rises to at least $300,000, calculated at an average BTC price of $3,000 recorded during their investigation. However, it is unclear if all victims were billed the same.

The general recommendation is not to pay the ransom in order to make the ransomware business unprofitable. So turning to a company that can decrypt files is a way to get the data back without endorsing criminal activity.

Ransomware victims should be aware that a legitimate company offering file decryption services does not make bold claims regarding the success of their efforts because there is a good chance of failure, especially with data locked by strong encryption. Only the availability of the decryption keys can give the confidence of recovery.

To be fair people in the position to fall completely for ransomware would just panic and seek the nearest oasis. Normal tech people such as myself who send inappropriate pictures to the Ransomdev, format our PC's and copy the files from our backup drive(s) cloud based our otherwise.

 

Here is some interesting info to boot

Quote

This activity is not without restrictions, though, and these companies should be more careful about who they negotiate with. At the end of November, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed sanctions for two Iran-based individuals associated with SamSam ransomware, banning any business with them. This means that transactions to their cryptocurrency wallets are in violation with the imposed sanctions.

Yeah these guys are evil and need to be stopped! Preying on innocent people like that... THEY ARE THE WORST!

 

Quote

The average ransom demand to businesses is around $10,000. According to Europol’s 2018 Internet Organized Crime Threat Assessment, the ransomware industry is now worth an estimated $5 billion annually.

.... then again...

Sourceshttps://www.informationsecuritybuzz.com/news/beware-ransomware-doctors/

                        https://www.bleepingcomputer.com/news/security/company-pretends-to-decrypt-ransomware-but-just-pays-ransom/

 

 

Bolivia.

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, SupremeGOAT said:

Shifro_business_model.png

My favorite part about this graphic is they made it in msword or something, and left the red underlines in fuck it. 

muh specs 

Gaming and HTPC (reparations)- ASUS 1080, MSI X99A SLI Plus, 5820k- 4.5GHz @ 1.25v, asetek based 360mm AIO, RM 1000x, 16GB memory, 750D with front USB 2.0 replaced with 3.0  ports, 2 250GB 850 EVOs in Raid 0 (why not, only has games on it), some hard drives

Screens- Acer preditor XB241H (1080p, 144Hz Gsync), LG 1080p ultrawide, (all mounted) directly wired to TV in other room

Stuff- k70 with reds, steel series rival, g13, full desk covering mouse mat

All parts black

Workstation(desk)- 3770k, 970 reference, 16GB of some crucial memory, a motherboard of some kind I don't remember, Micomsoft SC-512N1-L/DVI, CM Storm Trooper (It's got a handle, can you handle that?), 240mm Asetek based AIO, Crucial M550 256GB (upgrade soon), some hard drives, disc drives, and hot swap bays

Screens- 3  ASUS VN248H-P IPS 1080p screens mounted on a stand, some old tv on the wall above it. 

Stuff- Epicgear defiant (solderless swappable switches), g600, moutned mic and other stuff. 

Laptop docking area- 2 1440p korean monitors mounted, one AHVA matte, one samsung PLS gloss (very annoying, yes). Trashy Razer blackwidow chroma...I mean like the J key doesn't click anymore. I got a model M i use on it to, but its time for a new keyboard. Some edgy Utechsmart mouse similar to g600. Hooked to laptop dock for both of my dell precision laptops. (not only docking area)

Shelf- i7-2600 non-k (has vt-d), 380t, some ASUS sandy itx board, intel quad nic. Currently hosts shared files, setting up as pfsense box in VM. Also acts as spare gaming PC with a 580 or whatever someone brings. Hooked into laptop dock area via usb switch

Link to comment
Share on other sites

Link to post
Share on other sites

Found this humdinger in the comments 

image.png.41a7a4aecaf31fe5989a612839d0fcc0.png

muh specs 

Gaming and HTPC (reparations)- ASUS 1080, MSI X99A SLI Plus, 5820k- 4.5GHz @ 1.25v, asetek based 360mm AIO, RM 1000x, 16GB memory, 750D with front USB 2.0 replaced with 3.0  ports, 2 250GB 850 EVOs in Raid 0 (why not, only has games on it), some hard drives

Screens- Acer preditor XB241H (1080p, 144Hz Gsync), LG 1080p ultrawide, (all mounted) directly wired to TV in other room

Stuff- k70 with reds, steel series rival, g13, full desk covering mouse mat

All parts black

Workstation(desk)- 3770k, 970 reference, 16GB of some crucial memory, a motherboard of some kind I don't remember, Micomsoft SC-512N1-L/DVI, CM Storm Trooper (It's got a handle, can you handle that?), 240mm Asetek based AIO, Crucial M550 256GB (upgrade soon), some hard drives, disc drives, and hot swap bays

Screens- 3  ASUS VN248H-P IPS 1080p screens mounted on a stand, some old tv on the wall above it. 

Stuff- Epicgear defiant (solderless swappable switches), g600, moutned mic and other stuff. 

Laptop docking area- 2 1440p korean monitors mounted, one AHVA matte, one samsung PLS gloss (very annoying, yes). Trashy Razer blackwidow chroma...I mean like the J key doesn't click anymore. I got a model M i use on it to, but its time for a new keyboard. Some edgy Utechsmart mouse similar to g600. Hooked to laptop dock for both of my dell precision laptops. (not only docking area)

Shelf- i7-2600 non-k (has vt-d), 380t, some ASUS sandy itx board, intel quad nic. Currently hosts shared files, setting up as pfsense box in VM. Also acts as spare gaming PC with a 580 or whatever someone brings. Hooked into laptop dock area via usb switch

Link to comment
Share on other sites

Link to post
Share on other sites

Not paying the ransom to get your data back is the same principle to not paying the ransom to get your husband or son back. Sure, if everyone does it the kidnappers will find it unprofitable in the long run, but are YOU ready to sacrifice your loved ones for the benefit of potential future victims? Yeah, I don't think so.

Edited by AndrewCC
spelling
Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, AndrewCC said:

Not paying the ransom to get your data back is the same principle to not paying the ransom to get your husband or son back. Sure, if everyone does it the kidnappers will find it unprofitable in the long run, but are YOU ready to sacrifice your loved ones for the benefit of potential future victims? Yeah, I don't think so.

You can backup and restore data, you can't do the same for a person. Saying that data you weren't smart enough to backup is like losing a loved one is just stupid.

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

If you need to consider paying the ransom for your data it means you have no backups.

And if you lack reading comprehension, I said the principle behind not paying is the same, not that losing my photos or the project data I was working on were equivalent.

Link to comment
Share on other sites

Link to post
Share on other sites

Or you know, don't download suspicious programs.

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

This only encourages more ransomware attacks. Who knows, maybe the attackers will start pushing ads for this Dr Shifro...makes sense for them.

Link to comment
Share on other sites

Link to post
Share on other sites

I'm so confused. How do people actually still get viruses now-a-day. Especially the serious ransomware ones? 

 

I mean, I download crap, I go to porn sites, yet my computers remain virus free....

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, corrado33 said:

I'm so confused. How do people actually still get viruses now-a-day. Especially the serious ransomware ones? 

 

I mean, I download crap, I go to porn sites, yet my computers remain virus free....

I mean, people are getting better at designing viruses these days. People are still uneducated I guess. 

 

I don’t get why they didn’t just pay the ransom themselves, cut out the middle man and save some money. 

Link to comment
Share on other sites

Link to post
Share on other sites

Why would you pay more to someone instead of just paying up the ransomware? Sure, they say don't pay the criminals, but if that's only way to your important files, then you do it. The thing is, ransomware makers need to be honest when decrypting files after payment. If they weren't, that would be bad for their business because then, no one would pay up if it was known that they don't keep their end of the deal.

Link to comment
Share on other sites

Link to post
Share on other sites

22 minutes ago, RejZoR said:

Why would you pay more to someone instead of just paying up the ransomware?

There's no real guarantee the criminal won't just keep your money and the files. People spend more money for the (perceived) safer choice.

Make sure to quote or tag me (@JoostinOnline) or I won't see your response!

PSU Tier List  |  The Real Reason Delidding Improves Temperatures"2K" does not mean 2560×1440 

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, JoostinOnline said:

There's no real guarantee the criminal won't just keep your money and the files. People spend more money for the (perceived) safer choice.

Because that would be bad for their business? They need to give users a guarantee otherwise, what's the point of paying? If it becomes a common knowledge that they don't unlock things, then no one will even bother to pay them. Which is bad for them. So, they make sure they decrypt the files for which people pay.

 

Sure this guy was a hack, but that's the whole logic behind it. They need to get paid otherwise all ransomware is pointless. This russian dude just found a way to make a buck from someone elses crime lol

Link to comment
Share on other sites

Link to post
Share on other sites

I wounder why no crackers to solve this issue? 

becoz its not a "official" game / program so no body cares?

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, dgsddfgdfhgs said:

I wounder why no crackers to solve this issue? 

becoz its not a "official" game / program so no body cares?

Good luck decrypting a random generated key that was used to encrypt your files, specially if for each file a new key was generated, having basically double layered encryption since to decrypt the files you need the key to begin with...

Some Ransomware did get cracked, because they "shipped" the key with the ransomware instead of randomly generating it.

 

Unless you have a quantum computer, it's downright impossible to "crack" this procedure, only hoping that malware developers implemented (intentionally or not) some type of backdoor that would allow you to recover your files, this is not as basic as cracking a videogame back in the 90s by setting a "CD is present" bit, or emulating an online activation service for licensing that's activated with an internet connection.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×