Cybercriminal Group SnapMC Takes a Page from Ransomware Gangs in Data Breach-Turned-Extortion Attacks

Ransomware Gangs in Data BreachNew analysis of attacks shows threat actors that traditionally focus on stealing data are now utilizing extortion as their monetization strategy, converging tactics with ransomware attacks.

We’ve all become “comfortable” with the norm that ransomware gangs extort to make money and data breach gangs steal and sell the data. But a new cybercriminal gang identified as SnapMC by security researchers at the NCC Group appears to be blurring the threat tactic lines and could be the poster child for what’s to come.

According to NCC Group, SnapMC (named for their very fast attack patterns) gain access to and steal data from networks in under 30 minutes. Once data has been exfiltrated, the story changes and begins to look like a ransomware attack. The victim organization is notified via email of the data theft and an extortion begins – the victim has 24 hours to respond and 72 hours to negotiate. A list of stolen data is included and if the timeframes are not met, the data may be published with media outlets informed.

While this gang uses vulnerable Internet-facing devices as their initial attack vector, I suspect we’re going to see an entirely new set of services helping those experienced at data breaches to pivot their attack into an extortion scam, and plenty more phishing attack players getting into the game to provide the initial access to the data breach folks.

Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 23 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe To Our Blog

Free Phishing Security Resource Kit

Get the latest about social engineering

Subscribe to CyberheistNews