Article Details
Scrape Timestamp (UTC): 2023-10-20 16:08:22.704
Original Article Text
Click to Toggle View
Ragnar Locker ransomware developer arrested in France. Law enforcement agencies arrested a malware developer linked with the Ragnar Locker ransomware gang and seized the group's dark web sites in a joint international operation. Authorities from France, the Czech Republic, Germany, Italy, Latvia, the Netherlands, Spain, Sweden, Japan, Canada, and the United States were part of this international operation targeting the Ragnar Locker ransomware gang. In Spain, Latvia, and the Czech Republic, police agents have also raided multiple locations believed to be connected to other Ragnar Locker suspects. The Ragnar Locker ransomware gang is believed to have carried out attacks against 168 international companies globally since 2020. "In an action carried out between 16 and 20 October, searches were conducted in three different countries and in total six suspects were heard in the Czech Republic, Spain, Latvia and France. Furthermore, nine servers were taken down; five in the Netherlands, two in Germany and two in Sweden," Europol said today. "At the end of the action week, the main perpetrator, suspected of being a developer of the Ragnar group, has been brought in front of the examining magistrates of the Paris Judicial Court." "One of the developers of the malicious software was detained in France," the Ukrainian cyberpolice added in a separate statement. This joint operation marks the third action taken against the same ransomware gang. In September 2021, coordinated efforts involving French, Ukrainian, and US authorities led to the arrest of two suspects in Ukraine. Subsequently, in October 2022, another suspect was apprehended in Canada through a joint operation conducted by French, Canadian, and US law enforcement agencies. "The case was opened by Eurojust in May 2021 at the request of the French authorities. Five coordination meetings were hosted by the Agency to facilitate judicial cooperation between the authorities of the countries supporting the investigation," Europol said. "Eurojust set up a coordination centre during the action week to enable rapid cooperation between the judicial authorities involved." The joint action also led to cryptocurrency seizures and the ransomware operation's Tor negotiation and data leak sites being seized on Thursday. "This service has been seized as part of a coordinated law enforcement action against the Ragnar Locker group," a banner displayed on Ragnar Locker's data leak site reads. The Ragnar Locker (also known as Ragnar_Locker and RagnarLocker) ransomware operation surfaced in late December 2019 when it started targeting enterprise victims worldwide. In contrast to many modern ransomware gangs, Ragnar Locker did not operate as a Ransomware-as-a-Service, where affiliates are recruited to breach targets' networks and deploy the ransomware in exchange for a share of the revenue. Instead, Ragnar Locker operated semi-private, as they didn't actively recruit affiliates, choosing to collaborate with external penetration testers to breach networks. Ragnar Locker's list of previous victims includes prominent entities such as computer chip manufacturer ADATA, aviation giant Dassault Falcon, and Japanese game maker Capcom. According to the FBI, this ransomware has been deployed on the networks of at least 52 organizations across various critical infrastructure sectors in the United States since April 2020.
Daily Brief Summary
A multi-national law enforcement operation involving authorities from eleven nations has resulted in the arrest of a Ragnar Locker ransomware gang developer.
Six additional suspects associated with the ransomware gang were located and heard across France, Spain, Latvia, and the Czech Republic across these raids.
The operation also involved raids in multiple locations believed to be connected to other suspects, resulting in nine servers being taken down in the Netherlands, Germany, and Sweden.
This is the third operation against the Ragnar Locker ransomware gang, following actions in Ukraine and Canada.
The joint action also enabled the seizure of cryptocurrency and the ransomware operation's Tor negotiation and data leak sites.
Ragnar Locker, which emerged in late December 2019, targets enterprise victims worldwide and eschews the common Ransomware-as-a-Service model, favoring targeted network breaches via collaboration with external penetration testers.
Having attacked 168 international companies since 2020, including the likes of ADATA, Dassault Falcon, and Capcom, the FBI states this ransomware has been deployed on at least 52 organizations' networks across various critical infrastructure sectors in the United States since April 2020.