2021 National Rifle Association ransomware attack

Last updated

2021 National Rifle Association ransomware attack
Date
    • October 17–24, 2021 (likely timeframe of hack)
    • October 27, 2021 (release of documents by Grief)
Type Data breach, ransomware scam
Target National Rifle Association of America

On October 27, 2021, a Russian hacker group known as Grief published 13 documents attributed to the National Rifle Association of America (NRA) in a ransomware scam, claimed to have hacked the organization, and threatened to release more NRA documents if the undisclosed ransom was not paid.

Contents

Background

On October 21, 2021, the Federal Bureau of Investigation hacked and shut down REvil, a major hacking organization involved in ransomware scams. In response, other ransomware groups shared anti-United States messages on the dark web. [1] [2]

Prior to the ransomware attack, the National Rifle Association had been involved in multiple legal disputes, which Recorded Future analyst Allan Liska argued may have made them an easier target for cyberattacks as attention within the organization was pulled away from their security. [3]

Ransomware attack

NRA headquarters in Virginia NRA Virginia HQ.jpg
NRA headquarters in Virginia

Initial release of documents

On October 27, 2021, Grief published 13 documents on their website as part of a ransomware scam, attributing them as internal documents belonging to the NRA and claiming to have hacked the organization. [4] As reported in Wired, the hack likely took place within the week prior to the release of documents. [5] The group threatened to release more files if the ransom (an undisclosed amount of money [1] ) was not paid. [4]

An anonymous person with direct knowledge of the events at the NRA told Associated Press that the group had been having issues with its email system in the week prior to the publication of files by Grief, which is a potential indicator of a ransomware attack. [6] On October 28, The Register reported that it was unknown whether the hack had targeted the headquarters of the NRA or one of its local branches. [7]

The leaked files included the minutes from an NRA board meeting that occurred shortly before the release of documents as well as multiple files related to grants. [8] The Trace reported that one document appeared to be a late 2019 grant application made to the NRA by David Kopel on behalf of the Independence Institute for $267,000, with $248,500 earmarked as Kopel's salary. Kopel has repeatedly filed amicus briefs supporting the NRA in court, and has not disclosed a financial connection to the organization. [9]

After the ransomware attack was announced by Grief, hundreds of Twitter accounts that had all been created in August and September 2021 shared tweets about the attack. Most of the accounts had feminine names, and the majority used the default Twitter profile photo while others used pictures that appeared to be taken from the online dating services Shuri-Muri or Tralolo. Some of the same accounts had previously posted about an earlier ransomware attack by Grief or about the NRA, gun violence, or Nazis. [10] As of November 1,2021, it was unclear whether there was a connection between Grief and the network of Twitter accounts. [10] [11]

Temporary removal of released documents

On October 29, Grief removed the documents attributed to the NRA from the dark website where they had been published. Brett Callow, a threat analyst employed by Emsisoft, noted that while the delisting of the NRA on the website could mean that the organization paid the ransom, there were additional possibilities; it could also indicate that the NRA had entered into negotiations with Grief or that the ransomware group had chosen to remove the documents because they had drawn too much law enforcement attention. [5] However, on November 1, The Washington Times reported that Callow had published a screenshot showing that documents attributed to the NRA were again visible on the Grief website. [12]

Release of additional documents

On November 11, The Reload reported that Grief had published more internal documents the previous day, stating that these new documents included bank account information of the organization as well as information about specific employees including Social Security numbers and home addresses. The outlet additionally reported that the authenticity of the leaked documents had been confirmed by "six current and former NRA officials" including one individual whose personal information was exposed in the leak, who was not aware of its existence prior to being contacted by The Reload. [13] [14]

Also on November 10, Grief moved the NRA-related documents on its website from a section indicating hacks in progress to a different one indicating that it had been completed. No explanation was provided. [13]

Perpetrators

A Russian hacker group known as Grief was responsible for the ransomware scam. [4] The group first became active in May 2021. [15] NBC News reported that computer security experts believe that Grief is a rebrand of the Russian group Evil Corp. [1] [4] Evil Corp has been linked to ransomware attacks on Sinclair Broadcast Group as well as hundreds of financial entities across more than 40 countries. In 2019, action against the group including sanctions was taken by multiple United States federal agencies; [3] it is subject to sanctions by the United States Department of the Treasury. [16] Experts have additionally theorized that Grief is a rebrand of DoppelPaymer, another ransomware group associated with Evil Corp. [17]

Response

NRA response

On October 27, 2021, the NRA tweeted a statement by its managing director of public affairs Andrew Arulanandam. The statement said that the NRA does not discuss its security, but that the group "takes extraordinary measures to protect information regarding its members, donors, and operations". The NRA declined requests for further comment by The Hill [3] and requests for comment by NBC. [1] The Daily Beast reported that an email to the NRA spokesperson had returned an error message, potentially indicating that the organization's email server was offline, and that spokesperson Amy Hunter declined to comment after being reached by phone. [15]

As of October 27,2021, it was unclear whether the NRA had any plans to pay the ransom. [15] Because of the link between Grief and EvilCorp, which is sanctioned by the United States Treasury, the NRA would need the permission of the Treasury to transfer ransom money to Grief; [16] [8] doing so without permission could lead to the imposition of penalties. [5] [ clarification needed ]

As of October 29,2021, the NRA had not confirmed that they had been hacked or targeted by a ransomware scam, nor had they confirmed the validity of the documents released by Grief. They did not respond a request for comment from Wired asking whether they were negotiating with Grief or had paid the ransom. [5]

As of November 11,2021, the NRA had made no further official comment about the ransomware attack. The organization's response to the attack remained unclear. The Reload reported that multiple current and former NRA officials had confirmed the authenticity of the leaked documents, while NRA board member Phillip Journey told the outlet that the lack of information from NRA staff was "disconcerting" and asked "who knows how far it went, what they have, and what they could still sell?" [13] [14]

Public response

On October 28, The Register reported that the hack had generated an amused reaction on the Internet, suggesting that targeting the NRA may be more popular with the public than hacking government, school, and healthcare facilities as Grief historically has done. [7]

Related Research Articles

Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult-to-trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

<span class="mw-page-title-main">Timeline of Internet conflicts</span>

The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" who are widely suspected to be a branch of the National Security Agency (NSA) of the United States. Specifically, these exploits and vulnerabilities targeted enterprise firewalls, antivirus software, and Microsoft products. The Shadow Brokers originally attributed the leaks to the Equation Group threat actor, who have been tied to the NSA's Tailored Access Operations unit.

<span class="mw-page-title-main">WannaCry ransomware attack</span> 2017 worldwide ransomware cyberattack

The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated by using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches were imperative to cyber security, but many organizations did not apply them, citing a need for 24/7 operation, the risk of formerly working applications breaking because of the changes, lack of personnel or time to install them, or other reasons.

<span class="mw-page-title-main">Petya (malware family)</span> Family of encrypting ransomware discovered in 2016

Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system.

<span class="mw-page-title-main">2017 Ukraine ransomware attacks</span> Series of powerful cyberattacks using the Petya malware

A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germany, Italy, Poland, Russia, United Kingdom, the United States and Australia. ESET estimated on 28 June 2017 that 80% of all infections were in Ukraine, with Germany second hardest hit with about 9%. On 28 June 2017, the Ukrainian government stated that the attack was halted. On 30 June 2017, the Associated Press reported experts agreed that Petya was masquerading as ransomware, while it was actually designed to cause maximum damage, with Ukraine being the main target.

REvil was a Russia-based or Russian-speaking private ransomware-as-a-service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page Happy Blog unless the ransom was received. In a high profile case, REvil attacked a supplier of the tech giant Apple and stole confidential schematics of their upcoming products. In January 2022, the Russian Federal Security Service said they had dismantled REvil and charged several of its members.

Ryuk is a type of ransomware known for targeting large, public-entity Microsoft Windows cybersystems. It typically encrypts data on an infected system, rendering the data inaccessible until a ransom is paid in untraceable bitcoin. Ryuk is believed to be used by two or more criminal groups, most likely Russian, who target organizations rather than individual consumers.

DarkSide is a cybercriminal hacking group, believed to be based in Russia, that targets victims using ransomware and extortion; it is believed to be behind the Colonial Pipeline cyberattack. It is thought that they have been able to hack and extort money from around 90 companies in the USA alone. The group provides ransomware as a service.

<span class="mw-page-title-main">Health Service Executive ransomware attack</span> 2021 cyber attack on the Health Service Executive in Ireland

On 14 May 2021, the Health Service Executive (HSE) of Ireland suffered a major ransomware cyberattack which caused all of its IT systems nationwide to be shut down.

Conti is a ransomware hacker group that has been observed since 2020, believed to be distributed by a Russia-based group. It operates as a ransomware-as-a-service (RaaS), enabling other cybercriminals to deploy this malware for their own purposes. Conti is particularly known for its utilization of double extortion techniques, where it not only encrypts victim's files but also steals and threatens to publish sensitive data if the ransom is not paid.

Wizard Spider, also known as Trickbot, DEV-0193, UNC2053, or Periwinkle Tempest, is a cybercrime group based in and around Saint Petersburg in Russia. Some members may be based in Ukraine. They are estimated to number about 80, some of them may not know they are employed by a criminal organisation.

In mid-May 2021 hospital computer systems and phone lines run by the Waikato District Health Board (DHB) in New Zealand were affected by a ransomware attack. On 25 May, an unidentified group claimed responsibility for the hack and issued an ultimatum to the Waikato DHB, having obtained sensitive data about patients, staff and finances. The Waikato DHB and New Zealand Government ruled out paying the ransom.

<span class="mw-page-title-main">2022 Costa Rican ransomware attack</span> Attack on Costa Rican government systems

Beginning on the night (UTC-6:00) of April 17, 2022, a ransomware attack began against nearly 30 institutions of the government of Costa Rica, including its Ministry of Finance, the Ministry of Science, Innovation, Technology and Telecommunications (MICITT), the National Meteorological Institute, state internet service provider RACSA, the Costa Rican Social Security Fund, the Ministry of Labor and Social Security, the Fund for Social Development and Family Allowances, and the Administrative Board of the Municipal Electricity Service of Cartago.

Hive was a ransomware as a service (RaaS) operation carried out by the eponymous cybercrime organization between June 2021 and January 2023. The group's purpose was to attack mainly public institutions to subsequently demand ransom for release of hijacked data.

Clop is a cybercriminal organization known for its multilevel extortion techniques and global malware distribution. It has extorted more than $500 million in ransom payments, targeting major organizations worldwide. Clop gained notoriety in 2019 and has since conducted high-profile attacks, using large-scale phishing campaigns and sophisticated malware to infiltrate networks and demand ransom, threatening to expose data if demands are not met.

<span class="mw-page-title-main">Lockbit</span> Criminal hacking organization

LockBit is a cybercriminal group proposing ransomware as a service (RaaS). Software developed by the group enables malicious actors who are willing to pay for using it to carry out attacks in two tactics where they not only encrypt the victim's data and demand payment of a ransom, but also threaten to leak it publicly if their demands are not met.

BlackCat, also known as ALPHV and Noberus, is a ransomware family written in Rust. It made its first appearance in November 2021. By extension, it is also the name of the threat actor(s) who exploit it.

References

  1. 1 2 3 4 Collier, Kevin (October 27, 2021). "Cybercriminals claim to have hacked the NRA". NBC News . Archived from the original on October 27, 2021. Retrieved October 27, 2021.
  2. Collier, Kevin (October 22, 2021). "Ransomware hackers nervous, allege harassment from U.S." NBC News . Archived from the original on October 22, 2021. Retrieved October 27, 2021.
  3. 1 2 3 Miller, Maggie (October 27, 2021). "NRA hit by Russian-linked ransomware attack: reports". The Hill . Archived from the original on October 27, 2021. Retrieved October 27, 2021.
  4. 1 2 3 4 Stieb, Matt (October 27, 2021). "Russian Cybercriminals Claim to Have Hacked the NRA". New York . Archived from the original on October 27, 2021. Retrieved October 27, 2021.
  5. 1 2 3 4 Newman, Lily Hay (October 29, 2021). "An Apparent Ransomware Hack Puts the NRA in a Bind". Wired . ISSN   1059-1028 . Retrieved November 1, 2021.
  6. Tucker, Eric (October 27, 2021). "Ransomware gang says it targeted National Rifle Association". Associated Press . Archived from the original on October 27, 2021. Retrieved October 28, 2021.
  7. 1 2 Dobberstein, Laura (October 28, 2021). "Grief ransomware gang strikes again, claims it hit the NRA". The Register . Archived from the original on October 28, 2021. Retrieved October 28, 2021.
  8. 1 2 Greig, Jonathan (October 27, 2021). "NRA responds to reports of Grief ransomware attack". ZDNet . Archived from the original on October 28, 2021. Retrieved October 28, 2021.
  9. Van Sant, Will (November 3, 2021). "The NRA Paid a Gun Rights Activist to File SCOTUS Briefs. He Didn't Disclose it to the Court". The Trace . With contributions by Champe Barton. Archived from the original on November 3, 2021. Retrieved November 6, 2021.
  10. 1 2 Vavra, Shannon (November 1, 2021). "A Mysterious Network of Twitter Bots Promote Alleged NRA Hack". The Daily Beast . Retrieved November 3, 2021.
  11. Uchill, Joe (November 1, 2021). "As demo'd with NRA, 'information operations' may be new way to give ransomware victims Grief". SC Media . Archived from the original on November 1, 2021. Retrieved November 3, 2021.
  12. Lovelace, Ryan (November 1, 2021). "NRA's cyber problems multiplying in face of alleged hack". The Washington Times . Archived from the original on November 1, 2021. Retrieved November 6, 2021.
  13. 1 2 3 Gutowski, Stephen (November 11, 2021). "NRA Bank Account Information, Staff Social Security Numbers Leaked by Russian Hackers". The Reload . Archived from the original on November 11, 2021. Retrieved November 12, 2021.
  14. 1 2 Kutsch, Tom (November 12, 2021). "Daily Bulletin: Latest NRA Hack Reveals Sensitive Info From Organization, Personnel". The Trace . Archived from the original on November 12, 2021. Retrieved November 12, 2021.
  15. 1 2 3 Vavra, Shannon (October 27, 2021). "Russian Ransomware Gang Claims to Have Hacked the NRA". The Daily Beast . Retrieved October 28, 2021.
  16. 1 2 Cimpanu, Catalin (October 27, 2021). "Ransomware gang claims attack on NRA". The Record. Recorded Future. Archived from the original on October 27, 2021. Retrieved October 28, 2021.
  17. Ropek, Lucas (October 27, 2021). "The NRA Has Reportedly Been Hacked". Gizmodo . Archived from the original on October 28, 2021. Retrieved October 28, 2021.