U.S. Offers $10 Million Reward for Information on DarkSide Ransomware Group


The U.S. government on Thursday announced a $10 million reward for information that may lead to the identification or location of key individuals who hold leadership positions in the DarkSide ransomware group or any of its rebrands.

On top of that, the State Department is offering bounties of up to $5 million for intel and tip-offs that could result in the arrest and/or conviction in any country of individuals who are conspiring or attempting to participate in intrusions affiliated with the transnational organized crime syndicate.

Automatic GitHub Backups

“In offering this reward, the United States demonstrates its commitment to protecting ransomware victims around the world from exploitation by cyber criminals,” the State Department said in a statement. “The United States looks to nations who harbor ransomware criminals that are willing to bring justice for those victim businesses and organizations affected by ransomware.”

darkside ransomware note

The development comes in response to DarkSide’s high-profile attack on Colonial Pipeline in May 2021, taking down the largest fuel pipeline in the U.S. and disrupting fuel supply to the East Coast for roughly a week, after the hackers managed to gain entry into the company’s networks using a compromised virtual private network (VPN) account password that was circulating in the dark web.

Prevent Data Breaches

The ensuing heightened scrutiny in the wake of the attacks led to the DarkSide group shuttering its operations on May 17, citing a mysterious law enforcement seizure of its online attack infrastructure. The cartel has since attempted to resurrect itself in the form of BlackMatter, only for it to close shop a second time owing to pressure from local authorities and the disappearance of a part of its members last month.

While it’s common for ransomware gangs to go underground, regroup, and reincarnate, often under a new name, law enforcement agencies in the U.S., Europe, and Asia have sought to put pressure on the operators in various ways, forcing the cybercriminals to cease operations over fears of being outed and arrested.

Products You May Like

Articles You May Like

Smishing Triad Targets India with Fraud Surge
Snowflake Breach at Advance Auto Parts Hits 2.3 Million People
Should ransomware payments be banned? – Week in security with Tony Anscombe
5 common Ticketmaster scams: How fraudsters steal the show
Australian Defence Force Private and Husband Charged with Espionage for Russia

Leave a Reply

Your email address will not be published. Required fields are marked *