Info@NationalCyberSecurity
Info@NationalCyberSecurity

Hacking gangs launch cybercrime syndicate the Five Families | #cybercrime | #infosec


Four hacking gangs and a malware forum are joining forces to form a combined ransomware collective calling themselves the Five Families. The alliance says it aims to “establish better unity and connections for everyone in the underground world of the internet”. 

The Five Families – four hacking gangs and a malware forum – announced their new alliance today. (Photo by AS photo family/Shutterstock)

A leader from each individual gang will help set the agenda for the group, according to a post on Telegram today.

The Five Families cybercrime syndicate

The Five Families describes itself as a “group created to establish better unity and connections for everyone in the underground world of the internet, to expand and grow our work and operations”. It has taken the name given to five prominent Italian-American families involved in the New York mafia in the 1950s and 1960s.

The ransomware gangs involved are all well established and each has a long list of victims. SiegedSec is a hacktivism group which claims to promote a left-wing political agenda, opposing US government policies via hacking and releasing stolen documents.

In June it distributed hacked materials from agencies in six US states, in a bid to raise awareness and protest against legislation affecting gender affirming care. The data dump included South Carolina police files, a list of therapists in Texas and contact details for court officials in Nebraska.

Last year SiegedSec claimed to leak eight gigabytes of data stolen from two US state governments online in protest at the overturning of the Roe vs Wade decision, which guaranteed the right for women to have an abortion.

The gang has joined forces in the past with another in the collective, GhostSec, a prominent dark web hacking gang, active in targeting Russian forces throughout the war in Ukraine. According to a report into hacktivism by security vendor Mandiant, GhostSec and SiegedSec targeted operational technology assets – systems used to control and monitor industrial equipment – in the US, Israel and Russia in June 2022. 

Content from our partners
AI will equip the food and beverage industry for a resilient future

Insurance enterprises must harness the powers of data collaboration to achieve their commercial potential

How tech teams are driving the sustainability agenda across the public sector

GhostSec has also been in partnership with Arabic-speaking ransomware gang Stormous, another member of the Five Families collective. The two gangs officially announced their intentions to collaborate on Telegram on July 13, where they declared their cooperation to target organisations in Cuba. Stormous has been active since mid-2021 and hit the media last year when it claimed to have 161GB of data from Coca-Cola, demanding 16 million bitcoin from the global beverages company. 

The last in the collective is ThreatSec, which targets banks and governments it deems to be contravening human rights, such as Iran and Azerbaijan. The four groups have been joined by malware forum BlackForums, where ransomware data is often dumped and malware offered for sale. The forum is available on the clear web.

The Five Families is the latest in a long line of hacking syndicates

Hacking syndicates are nothing new in the cybercrime sphere. Recently, security analysts at Sophos linked Russian ransomware gangs BlackBasta, Hive and Royal, saying that “granular similarities” between the groups suggest all three are sharing technical details of their activities, or at least have affiliates in common.

Speaking at the BlackHat conference in Las Vegas earlier this month, Andrew Brandt, principle researcher at SophosLabs and one of the authors of the report, said: “Because the ransomware-as-a-service model requires outside affiliates to carry out attacks, it’s not uncommon for there to be crossover in the tactics, techniques and procedures between these different ransomware groups.”

Conti, another prolific Russian ransomware group, was shown to work closely with the LockBit, Maze and Ryuk groups when files showing its inner workings leaked online last year.





Source link

——————————————————–


Click Here For The Original Source.

National Cyber Security

FREE
VIEW