Fancy Lazarus DDoS Extortion Group Back With New Campaign

Cyber criminals continue to seeks ways to extort payments from potential victims, as evidenced by the scourge of ransomware attacks over the past two years.

But now European IT security provider Link11 has warned in a blog post that its Security Operations Center (LSOC) has observed a sharp increase in ransom distributed denial of service (RDDoS or RDoS) attacks.

This new wave of DDoS extortion campaigns is targetting companies across Europe and North America on behalf of Fancy Lazarus, warned Link11.

DDoS extortion

In February this year Neustar said that it had seen seen a massive rise in denial-of-service attacks over the past year, with more attackers now demanding ransoms. Indeed it found DDoS attacks rose by 154 percent, or more than two and a half times, in 2020 compared with 2019.

A traditional DDoS attack usually involves the use of a distribute network of bots – usually computers that have been infected with malware without the knowledge of their users – to send junk traffic that overloads an organisation’s systems, making them inaccessible.

Ransom-related DDoS attacks however, are typically preceded by an extortion email promising a small attack the following day, followed by an attack utilising up to 2TB per second (Tbps) of junk traffic if the ransom is not paid.

Google last October disclosed a 2.5Tbps DDoS attack that is currently the internet’s largest-known incident of its kind.

Attackers often sign the letter with the name of well-known, state-backed attack groups, including Fancy Bear, the Lazarus Group and the Armada Collective.

Fancy Lazarus seems to be a combination of those two groups.

Pay or Suffer DDoS

On Wednesday LSOC said that ransom distributed denial of service (RDDoS or RDoS) attacks are targetting enterprises from a wide range of business sectors.

The victims are receiving extortion e-mails from the sender Fancy Lazarus demanding two bitcoins.

“It’s a small price for what will happen when your whole network goes down. Is it worth it? You decide!”, the extortionists reportedly argue in their email.

So far, LSOC has received reports of RDoS attacks from several European countries, such as Germany and Austria, and the USA and Canada.

According to Link11, the DDoS extortionists gather information about the company’s IT infrastructure in advance and provide clear details in the extortion email about which servers and IT elements they will target for the warning attacks.

“To exert pressure, the attackers rely on demo attacks, some of which last several hours and are characterised by high volumes of up to 200Gbps,” said Link11. “To achieve these attack bandwidths, the perpetrators use reflection amplification vectors such as DNS. If the demands are not met, the contacted company is threatened with massive high-volume attacks of up to 2Tbps.”

The victim organisation is given seven days to transfer the Bitcoins to a specific Bitcoin wallet. The email also reportedly states that the ransom would increase to 4 Bitcoin with the passing of the payment deadline and increase by another Bitcoin with each additional day.

Sometimes, the announced attacks fail to materialise after the expiration of the ultimatum. In other cases, DDoS attacks cause considerable disruption to the targeted companies.

Pandemic vulnerability

And it seems that the new wave of extortion is hitting many companies when a large part of the staff is still organised via remote working because of the Coronavirus pandemic.

“The rapid digitisation that many companies have gone through in the past pandemic months is often not yet 100 percent secured against attacks,” noted Marc Wilczek, managing director of Link11.

“The surfaces for cyber attacks have risen sharply, and IT has not been sufficiently strengthened. Perpetrators know how to exploit these still open flanks with perfect precision,” Wilczek added.

Link11 advises organisations confronting a DDoS extortion attempt to proactively activate their DDoS protection systems and not respond to the extortion under any circumstances.

LSOC also advises attacked companies to file a report with law enforcement authorities. The National Cyber Security Centers are the best place to turn to for assistance and advice.

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

AT&T Admits Data Breach Impacted “Nearly All” Customers

American telecommunications giant AT&T admits that “nearly all” customer accounts were compromised in 2022 breach

3 hours ago

Elon Musk’s X Breached DSA Rules, EU Finds

X's BlueChecks “used to mean trustworthy sources of information. Now our preliminary view is that…

7 hours ago

Japan’s SoftBank Acquires AI Chip Start-up Graphcore

SoftBank Group has purchased another British chip firm, with the acquisition of Bristol-based Graphcore Ltd…

8 hours ago

Samsung AI-Upgraded Bixby Voice Assistant Coming This Year

Samsung reportedly confirms it will launch the upgraded voice assistant Bixby this year, that will…

1 day ago

Next Neuralink Brain Implant Coming Soon, Says Musk

Despite an issue with first Neuralink implant in a patient, Elon Musk says second brain…

1 day ago

EU Accepts Apple’s Legal Commitments To Open NFC Access

Legal commitment over Apple's NFC-based mobile payments system, which is to be opened to rival…

1 day ago