In a year rife with ransomware attacks, when cybercriminals have held the data of police departments, grocery and pharmacy chains, hospitals, pipelines and water treatment plants hostage with computer code, it was a win, rare in the scale of its success.
For months, a team of security experts raced to help victims of a high-profile ransomware group quietly recover their data without paying their assailants a dime.
It started in late summer, after the cybercriminals behind the Colonial Pipeline ransomware attack, known as DarkSide, emerged under a new name, BlackMatter. Soon, the cybercriminals made a glaring mistake that most likely cost them tens, if not hundreds, of millions of dollars. They left open a digital door.
Ransomware criminals encrypt a victim’s data and demand a ransom payment, sometimes millions of dollars, to return access. But when BlackMatter committed a critical error in an update to its code, researchers at Emsisoft, a cybersecurity firm in New Zealand, realized they could exploit the error, decrypt files and return access to the data’s rightful owners.
Emsisoft hustled to track down dozens of victims in the United States, Britain and Europe so it could help them secretly unlock their data. In the process, the firm kept millions of dollars in cryptocurrency out of the cybercriminals’ coffers.
It was a short-lived victory in the cat-and-mouse game of ransomware, which is expected to cost organizations $20 billion in losses this year, according to a report from research firm Cybersecurity Ventures. It was so unusual, even the victims whose data was saved by the effort could not believe it. Many thought Emsisoft was running a scam.
Emsisoft officials described their operation, which has not been reported before, in a series of interviews with The New York Times.
“At first there was a lot of shock and disbelief,” Fabian Wosar, chief technology officer at Emsisoft, said last month. “Imagine you have a problem. You think it’s unfixable. Everyone tells you it’s unfixable. Your paranoia is in overdrive. And someone shows up at your front door and says, ‘Hey, by the way I can help you.’ ”
To assuage victims’ concerns, Emsisoft researchers asked their contacts at cybersecurity companies and government agencies around the world to vouch for them.
While Emsisoft would not identify the victims, it said they had included key manufacturers, transportation companies and food suppliers across continental Europe, Britain and the United States.
The timeline of Emsisoft’s effort overlaps with BlackMatter’s ransomware assaults on two U.S. agriculture organizations: NEW Cooperative, an Iowa grain cooperative, and Crystal Valley, a Minnesota farming supply cooperative. Both cooperatives recovered quickly, suggesting that Emsisoft might have helped. Neither company returned requests for comment.
Eric Goldstein, executive assistant director for cybersecurity at the federal Cybersecurity and Infrastructure Security Agency, called the effort a model for public and private collaboration. The agency is trying to develop a comprehensive “whole of nation” plan to address cyberthreats, particularly for “critical infrastructure,” most of which is owned by the private sector.
CISA recently created the Joint Cyber Defense Collaborative, which teams government agencies with tech firms like Microsoft and Amazon, telecommunication firms like AT&T and Verizon, and cybersecurity firms like CrowdStrike and Palo Alto Networks to address threats like ransomware.
The Emsisoft operation is one of a handful of recent victories over ransomware. In June, the Justice Department announced that it had clawed back $2.3 million of the $4.4 million in cryptocurrency that Colonial Pipeline paid BlackMatter. More recently, an operation run by several governments knocked REvil, a major Russian ransomware outfit, offline.
That effort followed several smaller victories against REvil over the summer. The group, which is responsible for thousands of ransomware attacks, found itself in the government’s crosshairs after it pulled off a high-profile attack on JBS, one of the world’s biggest meatpacking operators, and Kaseya, a Miami software company.
A week later, REvil’s websites went dark, leading to speculation that governments may have played a role. A week after that, Kaseya announced that a mysterious “third party” had given it the key to unlock its customers’ encrypted data. In fact, the FBI later confirmed that it had secured a key but delayed giving it to Kaseya’s customers while it coordinated with other agencies to take down the group. But before it could act, REvil went offline on its own.
Recent history suggests REvil’s operators could just reemerge under a new name. As long as ransomware groups enjoy immunity in Russia and other nations, ransomware continues to plague American companies and organizations.
American cybersecurity officials concede that beyond a few brief triumphs, there has been no material shift in Russian cyberattacks since President Joe Biden’s first summit with Russia’s president, Vladimir Putin, in June. Biden warned Putin that attacks on America’s 16 critical infrastructure sectors — like the food suppliers hit last month — could warrant retaliation.
But in September, when BlackMatter hit NEW Cooperative, cybercriminals mocked the idea that the grain collective counted as critical infrastructure, posting sarcastically that “everyone will incur losses,” in chats monitored by Recorded Future, a cybersecurity firm.
The noise around the NEW Cooperative attack created additional challenges for Emsisoft, the company said. Emsisoft had been finding BlackMatter victims through posts to a Google-owned platform, VirusTotal, which is a kind of search engine for malware.
Those posts helped link Emsisoft’s teams to the chat platform that BlackMatter used to negotiate ransom payouts with its victims. Emsisoft monitored the chats to see if cybercriminals or victims dropped the name of their organization, then used that information to contact the victims.
But after NEW Cooperative’s attack made headlines, unexpected visitors started leaving insults in chat rooms where BlackMatter negotiated payments. When BlackMatter threatened to leak NEW Cooperative’s data online for violating its “data recovery guidelines,” someone replied with an unsavory insult directed at a BlackMatter criminal’s mother.
A representative for NEW Cooperative made clear in the chat that the comment had come not from them but from “random people from the internet.” The exchange prompted BlackMatter to shut down access to its online chats and start vetting anyone who entered. In the process, Emsisoft lost a key way to reach the victims.
Emsisoft knew it could not publish its secret ability without tipping off BlackMatter. But the company was still able to reach several BlackMatter victims whose data had been posted online.
Emsisoft knew it was running out of time. Inevitably, BlackMatter would start to wonder why so many victims stopped paying their ransoms or why many did not even bother to respond.
Finally, in September, BlackMatter caught the mistake. It was back to the drawing board for researchers at Emsisoft and other companies.
“We are no longer really able to help victims,” Wosar said, “but we had quite a long run.”