Fraud Management & Cybercrime , Ransomware

Ransomware: It Takes A Village, Says NCSC

UK Crime and Cybersecurity Agencies Urge 'Holistic' View of Ransomware Ecosystem
Ransomware: It Takes A Village, Says NCSC
Image: Shutterstock

Stopping the ransomware epidemic is less about tackling individual crypto-locking malware variants and more about combating the entire ecosystem of bad actors underpinning digital extortion, the British government said Monday.

See Also: The Gorilla Guide to Modern Data Protection

Behind any infection from name-brand ransomware such as LockBit or BlackCat lies a loose network of affiliates, initial access brokers and other actors, warned the U.K National Crime Agency and National Cyber Security Center in a white paper.

"While on the surface, an attack can be attributed to a piece of ransomware, the reality is more nuanced, with a number of cybercriminal actors involved throughout the process," the agencies said.

"Tackling individual ransomware variants - something which the NCSC and NCA are frequently challenged on - is akin to treating the symptoms of an illness, and is of limited use unless the underlying disease is addressed."

Although law enforcement agencies might be successful in identifying groups, without a "holistic view" of the ransomware ecosystem, law enforcement is reduced to playing whack-a-mole with ransomware groups, the white paper asserts.

"Typically it's the affiliate that obtains and uses the access, not the ransomware-as-a-service group," the agencies said. "This is an important distinction in the eyes of the law and is actually two different offences under the Computer Misuse Act, 1990."

This means that writing and selling ransomware is considered a lesser crime under British hacking law. An initial access broker, despite typically not obtaining revenue directly from ransomware attacks, could face a much more severe punishment.

British officials have called for lawmakers to revise the hacking law, saying that its limitations of jurisdiction to U.K. persons or someone using U.K. infrastructure make it difficult to prosecute hackers acting from overseas, such as ransomware groups (see: UK National Crime Agency Head Calls for Hacking Law Updates).

Despite these challenges, a "follow the money" approach that tracks down crooks' cryptocurrency wallets has proved increasingly effective for law enforcement agencies in the U.K. and elsewhere in identifying and dismantling ransomware infrastructure, the report says.

These actions have resulted in U.K. and U.S agencies sanctioning 11 TrickBot operators and, months earlier, sanctioning seven other TrickBot operators.


About the Author

Akshaya Asokan

Akshaya Asokan

Senior Correspondent, ISMG

Asokan is a U.K.-based senior correspondent for Information Security Media Group's global news desk. She previously worked with IDG and other publications, reporting on developments in technology, minority rights and education.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.