Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
New details reveal the unusual strategies employed by ransomware negotiators in a recent attack on the University of California.
Details of a week-long negotiation between the University of California and a NetWalker ransomware gang have been revealed by Bloomberg.
The Universityâs School of Medicine was working on a vaccine for Covid-19 in June this year when seven of its servers were locked down by the hackers. Against the advice from FBI, the university took matters into its own hands and conducted private negotiations.
The university negotiator used flattery, appealed to the hackers sense of sympathy and ethics, and managed to reduce the ransom amount from as much as $6M, down to just over $1 million in Bitcoin (BTC) and successfully restored the systems.
Right off the bat, the negotiator ensured they had the hackerâs âoperatorâ on their side, calling for respect from both sides, âIâm willing to work this out with you, but there has to be mutual respect. Donât you agree?â. Before waiting for a response, they also appealed to the attackerâs pride:
âI have read about you on the internet and know that you are a famous ransomware hacker group and very professional. I know you will honor your word when we agree on a price, right?â
This appeared to work with the operator responding: âWe are 100% about respect, and never will we disrespect a client who talk to us with respect.â
Negotiations shifted to feeling out how dedicated each side was, with the negotiator crying poor and stating that all funds had gone into the research with none left to spare.
Calling the apparent bluff, the operator replied that a school who collects over $7 billion in annual revenue should have no trouble paying a few million:
âYou need to understand, for you as a big university [...] you can collect that money in a couple of hours. You need to take us seriously.â
The first offer by the university was $780,000 and was also scoffed at by the operator. âKeep that $780k to buy McDonalds for all employees. Is very small amount for us,â adding, âI am sorry.â
More time â for both sides
As is typical in ransom situations, the negotiator then asked for two more days in order to allow âthe university committee that makes all the decisionsâ to meet again. The operator agreed on the condition that the $3 million ransom be doubled to $6 million.
A ransomware negotiator from Tel Aviv, Moty Cristal, told Bloomberg the extension might have proved useful for the attackers too, giving them time to identify the value of their stolen data.
The Netwalker Group is a large-scale criminal enterprise and leases its software in a franchise style program. The group posted a recruitment ad in March this year, adding new affiliates to their network.
Getting personal
At this point, either out of desperation or as a psychological strategy, the negotiator started appealing to the operatorâs sympathies. âI havenât slept in a couple of days because Iâm trying to figure this out for you,â they said, âI am being viewed as a failure by everyone here and this is all my fault this is happening.â
âThe longer this goes on, the more I hate myself [...] All I ask is that you be the only one in my life right now to treat me nice. Youâre the only one in the world right now who knows exactly what Iâm going through.â
The operator seemed responded: âMy friend, your team needs to understand this is not your failure. Every device on the internet is vulnerable.â
Four days into the attack, the negotiator eventually came back with an offer over $1 million, saying they were bending their internal rules to accept an additional $120K donation on the grounds that the negotiations come to a close. They even added a time pressure:
âWe normally canât accept these donations, but weâre willing to make it work only if you agree to end this quickly.â
The university spent 36 hours organising the purchase of 116 Bitcoin ($1.14 million) and sending the funds to the attackers. Two more days were required for the hackers to confirm the deletion of all sensitive data and give access back to the university.
After more than eight days without access, the university successfully gained complete access back to all their servers. However the servers remained offline while they investigated the incident with the FBI and other cybersecurity consultants. In the most recent update on June 26, the university stated that the investigation was still ongoing.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.