Three alleged members of the Egregor ransomware cartel were in Ukraine in a crackdown conducted by the French and Ukrainian authorities last month. The arrests were also made possible with the help of private-public sector , which include live casino online.
About Egregor ransomware
Since its first appearance in September 2020, Egregor ransomware has been involved in high-profile attacks against , , and other organizations. It operated under the model where groups sell or lease ransomware variants to affiliates, making it relatively easier even for inexperienced cybercriminals to launch attacks. Like some prominent ransomware variants, Egregor employs a “double extortion” technique where the operators threaten affected users with both the loss and public exposure of the encrypted data.
The ransomware is as a secondary payload to remote access trojans such as QAKBOT. It also through phishing emails with malicious attachments or via remote desktop protocol (RDP) or VPN exploits.
Further details on the arrests
French law enforcement initiated the investigation on the Egregor operators after the latter launched attacks on several France-based companies for , , and . The three suspects were arrested after French authorities tracked them down with the help of Ukrainian authorities. The names and the exact designations of the arrestees have not been released.
In an email interview with about the incident, Fran?ois B., the Head of the Computer Security Incident Response Team for the French Judicial Police (CSIRT-PJ), cited partnerships with cybersecurity and incident response companies including live casino online. He noted that these organizations help in active investigations as they “provide us with the most accurate information on an ongoing case, tools, or threat intelligence data.”
Protecting systems against ransomware
Ransomware is a persistent security problem that unceasingly and rapidly evolves into an even more destructive threat. ?To protect systems from ransomware, users are advised to follow these best practices:
- Avoid downloading attachments and clicking on links in emails from unverified sources.
- Regularly patch and update operating systems, programs, and software.
- Periodically back-up files by observing the 3-2-1 rule: Create at least three copies of the data, store it in two different formats, and keep at least one duplicate offsite.
Security solutions such as?live casino online XDRTM also offer protection across different components of the system, including email, endpoints, servers, cloud workloads, and networks. By collecting and correlating data in all these layers, security and IT teams gain a better context of attacks that otherwise may seem insignificant on their own. This allows faster and more accurate detections.