Ransomware: HardBit 2.0 asks for cyber insurance

Ransomware: HardBit 2.0 asks for cyber insurance

Share post

The HardBit 2.0 ransomware group asks the company for cyber insurance information after a successful attack. The group wants to adjust their claims to the sum insured and pretends to be friendly.

Security researchers at Varonis Threat Labs warn of a new ransomware group that appears to be using a new extortion tactic: HardBit 2.0 tries to convince victims that it is in their best interest to disclose all insurance details so they can customize their claims that the insurer covers all costs.

Hackers: Together against the insurance

🔎 HardBit asks the victims for the sum insured (Image: Varonis).

HardBit was first observed in October 2022 and has been appearing under version 2.0 since November. Unlike most ransomware actors, HardBit does not have a leak site. Nonetheless, cyber criminals claim that they are stealing victims' data and threaten to make it public if no ransom is paid. HardBit 2.0 uses similar techniques and attack tactics as other ransomware groups, such as distributing malicious payloads to unsuspecting employees, using compromised credentials, and exploiting vulnerabilities in exposed hosts. What distinguishes this new group from well-known gangs is the blackmail tactic: The ransomware message to the victims does not contain a specific ransom demand, but a request to anonymously provide details about the insurance policy:

Request for the amount of damage

"If you anonymously tell us that your business is insured for $10 million and provide other important information about coverage, we will not ask for more than $10 million in correspondence with the insurance agent. That way you could avoid a leak and decrypt your information.”

It is not the cybercriminals, but the "insidious" insurance companies that are portrayed as opponents in this way. Accordingly, it is also in the interests of the victims to cooperate with the extortionists in this way: "But since the sneaky insurance agent deliberately negotiates in such a way that he does not pay for the insurance claim, only the insurance company wins in this situation.

In order to avoid all this and get the money from the insurance company, you should anonymously inform us about the conditions of the insurance cover. The poor multi-millionaire insurers will not starve and become poorer by paying the maximum amount stipulated in the contract. […] So, thanks to our cooperation, let them fulfill the conditions prescribed in your insurance contract.”

Data disclosure may terminate insurance coverage

As a rule, the insured are contractually obliged not to give the attackers any insurance data, as otherwise there is a risk that the damage will not be covered. That is why the cyber criminals insist that this data is shared anonymously. Their goal is and remains the extortion of money and affected companies are well advised not to trust them.

More at Varonis.com

 


About Varonis

Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more