<p>US authorities have identified a relatively new gang of cyber criminals as being behind the ransomware attack which paralyzed a key fuel pipeline.</p>.<p>Called DarkSide, experts say it is one of a growing number of outfits that provide attack software to other groups.</p>.<p>DarkSide first emerged publicly in August 2020 and it specializes in what is known as ransomware: programs that infiltrate a victim's computer network and then encrypt data on machines, thus blocking operations. The criminals then demandi a ransom to free the data.</p>.<p>Experts believe that the team behind DarkSide is made up of experienced cyber criminals as the software goes beyond earlier indiscriminate ransomware attacks.</p>.<p><strong>Read | <a href="http://Cyber sleuths blunted pipeline hack, choked data flow to Russia Read more at: https://www.deccanherald.com/international/world-news-politics/cyber-sleuths-blunted-pipeline-hack-choked-data-flow-to-russia-984665.html" target="_blank">Cyber sleuths blunted pipeline hack, choked data flow to Russia</a></strong></p>.<p>"DarkSide follows the double extortion trend, which means the threat actors not only encrypt the user's data, but first exfiltrate the data and threaten to make it public if the ransom demand is not paid," said analysts at Cybereason, a firm which helps companies protect themselves against such attacks.</p>.<p>"This technique effectively renders the strategy of backing up data as a precaution against a ransomware attack moot," the company said on its website.</p>.<p>If the group doesn't get what it wants, it can "auction the data off to other pirates, to databases of stolen information," said Damien Bancal, a journalist at Zataz.com who specializes in the illegal traffic of stolen information.</p>.<p>DarkSide can also threaten to make public sensitive or embarrassing data.</p>.<p>"The amount of a DarkSide ransom varies between $200,000 and $2 million," France's national data security agency Ansii said in February.</p>.<p>Experts believe that DarkSide rarely carries out attacks itself.</p>.<p>Instead, it provides the software and assists its clients who carry out the attacks.</p>.<p><strong>Also Read | <a href="http://Major US pipeline struggles to reopen after cyberattack Read more at: https://www.deccanherald.com/business/business-news/major-us-pipeline-struggles-to-reopen-after-cyberattack-984358.html" target="_blank">Major US pipeline struggles to reopen after cyberattack</a></strong></p>.<p>"Those responsible for DarkSide are very organized, and they have a mature Ransomware as a Service (RaaS) business model and affiliate program," said Cybereason.</p>.<p>"The group has a phone number and even a help desk to facilitate negotiations with and collect information about its victims -- not just technical information regarding their environment but also more general details relating to the company itself like the organization's size and estimated revenue," the company added.</p>.<p>Zataz.com's Damien Bancal said DarkSide even offers a sort of "after-sale service" option to help negotiate with victims.</p>.<p>Security expert Gerome Billois at WaveStone compared DarkSide's business model to that of technology platforms like Uber. It links up cyber criminals with potential victims, provides the necessary software, and receives a commission from whatever ransom is paid.</p>.<p>In a statement published on the darknet -- a area of the Internet not accessible by the general public -- DarkSide states that it has no political agenda and no governmental links.</p>.<p>It said it is out to make money, not to create social problems so it claimed it will only ransom companies that can afford it.</p>.<p>US authorities believe DarkSide is based in Russia.</p>.<p>While US President Joe Biden said US intelligence had no evidence linking the group to the Kremlin, he said the Russian government had "some responsibility to deal with this".</p>.<p>The Russian embassy in Washington on Tuesday denied any government link to the attack on the Colonial Pipeline, which carries fuel from Texas to major cities across the eastern United States.</p>.<p>But certain computer security experts suspect that the Russian government may condone DarkSide's operations as it appears to target Western firms but not Russian.</p>.<p>"So a ransomware group we believe is operating (and likely harbored) by Russia has shutdown a company that is moving 45 percent of petroleum supplying the East Coast," tweeted at the weekend Dmitri Alperovitch, former CTO and founder of computer security firm CrowdStrike.</p>.<p>Kaspersky, a Russian computer security firm believes that DarkSide may not have expected the attack against Colonial to result in the shutting down of the pipeline and the attention that has drawn.</p>.<p>The company believes DarkSide may dial back its attacks to avoid any similar situation.</p>
<p>US authorities have identified a relatively new gang of cyber criminals as being behind the ransomware attack which paralyzed a key fuel pipeline.</p>.<p>Called DarkSide, experts say it is one of a growing number of outfits that provide attack software to other groups.</p>.<p>DarkSide first emerged publicly in August 2020 and it specializes in what is known as ransomware: programs that infiltrate a victim's computer network and then encrypt data on machines, thus blocking operations. The criminals then demandi a ransom to free the data.</p>.<p>Experts believe that the team behind DarkSide is made up of experienced cyber criminals as the software goes beyond earlier indiscriminate ransomware attacks.</p>.<p><strong>Read | <a href="http://Cyber sleuths blunted pipeline hack, choked data flow to Russia Read more at: https://www.deccanherald.com/international/world-news-politics/cyber-sleuths-blunted-pipeline-hack-choked-data-flow-to-russia-984665.html" target="_blank">Cyber sleuths blunted pipeline hack, choked data flow to Russia</a></strong></p>.<p>"DarkSide follows the double extortion trend, which means the threat actors not only encrypt the user's data, but first exfiltrate the data and threaten to make it public if the ransom demand is not paid," said analysts at Cybereason, a firm which helps companies protect themselves against such attacks.</p>.<p>"This technique effectively renders the strategy of backing up data as a precaution against a ransomware attack moot," the company said on its website.</p>.<p>If the group doesn't get what it wants, it can "auction the data off to other pirates, to databases of stolen information," said Damien Bancal, a journalist at Zataz.com who specializes in the illegal traffic of stolen information.</p>.<p>DarkSide can also threaten to make public sensitive or embarrassing data.</p>.<p>"The amount of a DarkSide ransom varies between $200,000 and $2 million," France's national data security agency Ansii said in February.</p>.<p>Experts believe that DarkSide rarely carries out attacks itself.</p>.<p>Instead, it provides the software and assists its clients who carry out the attacks.</p>.<p><strong>Also Read | <a href="http://Major US pipeline struggles to reopen after cyberattack Read more at: https://www.deccanherald.com/business/business-news/major-us-pipeline-struggles-to-reopen-after-cyberattack-984358.html" target="_blank">Major US pipeline struggles to reopen after cyberattack</a></strong></p>.<p>"Those responsible for DarkSide are very organized, and they have a mature Ransomware as a Service (RaaS) business model and affiliate program," said Cybereason.</p>.<p>"The group has a phone number and even a help desk to facilitate negotiations with and collect information about its victims -- not just technical information regarding their environment but also more general details relating to the company itself like the organization's size and estimated revenue," the company added.</p>.<p>Zataz.com's Damien Bancal said DarkSide even offers a sort of "after-sale service" option to help negotiate with victims.</p>.<p>Security expert Gerome Billois at WaveStone compared DarkSide's business model to that of technology platforms like Uber. It links up cyber criminals with potential victims, provides the necessary software, and receives a commission from whatever ransom is paid.</p>.<p>In a statement published on the darknet -- a area of the Internet not accessible by the general public -- DarkSide states that it has no political agenda and no governmental links.</p>.<p>It said it is out to make money, not to create social problems so it claimed it will only ransom companies that can afford it.</p>.<p>US authorities believe DarkSide is based in Russia.</p>.<p>While US President Joe Biden said US intelligence had no evidence linking the group to the Kremlin, he said the Russian government had "some responsibility to deal with this".</p>.<p>The Russian embassy in Washington on Tuesday denied any government link to the attack on the Colonial Pipeline, which carries fuel from Texas to major cities across the eastern United States.</p>.<p>But certain computer security experts suspect that the Russian government may condone DarkSide's operations as it appears to target Western firms but not Russian.</p>.<p>"So a ransomware group we believe is operating (and likely harbored) by Russia has shutdown a company that is moving 45 percent of petroleum supplying the East Coast," tweeted at the weekend Dmitri Alperovitch, former CTO and founder of computer security firm CrowdStrike.</p>.<p>Kaspersky, a Russian computer security firm believes that DarkSide may not have expected the attack against Colonial to result in the shutting down of the pipeline and the attention that has drawn.</p>.<p>The company believes DarkSide may dial back its attacks to avoid any similar situation.</p>