{"id":19041,"date":"2021-08-23T18:38:16","date_gmt":"2021-08-23T18:38:16","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19041"},"modified":"2021-08-23T18:38:16","modified_gmt":"2021-08-23T18:38:16","slug":"ransomware-groups-look-for-inside-help","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/","title":{"rendered":"Ransomware Groups Look for Inside Help"},"content":{"rendered":"<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">Ransomware<\/a> attackers, who use myriad methods to get their <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> into the systems of businesses large and small in hopes of pulling down millions of dollars, are now going directly to the source.<\/p>\n<p>A researcher with email security solutions vendor Abnormal Security found a threat actor directly emailing employees of a company urging them to release the ransomware into a company computer or Windows server in return for 40 percent \u2013 about $1 million \u2013 of the expected $2.5 million ransom the company would pay.<\/p>\n<p>The hope was that one of the emails would hit the inbox of a disgruntled employee who would be willing to turn his displeasure into a payday that would help him and the cybercriminal.<\/p>\n<p>\u201cHistorically, ransomware has been delivered via email attachments or, more recently, using direct network access obtained through things like unsecure VPN accounts for software vulnerabilities,\u201d Crane Hassold, director of threat intelligence at Abnormal Security, wrote in a <a href=\"https:\/\/abnormalsecurity.com\/blog\/nigerian-ransomware-soliciting-employees-demonware\/\">blog post<\/a>. \u201cSeeing an actor attempt to use basic <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">social engineering techniques<\/a> to convince an internal target to be complicit in an attack against their employer was notable.\u201d<\/p>\n<h2>Evolving Ransomware Scene<\/h2>\n<p>The case of a direct approach to company employees is the latest illustration of the ever-evolving and fluid nature of a ransomware landscape that has become a key threat to organizations around the world. According to a <a href=\"https:\/\/atlasvpn.com\/blog\/ransomware-attacks-surge-by-over-150-in-2021\">report<\/a> this week by Atlas VPN, the number of ransomware attacks in the first half of 2021 have jumped year-over-year by 151 percent, with the United States being the most targeted country by a wide margin. The numbers in the report come from cybersecurity vendor SonicWall.<\/p>\n<p>There were 304.7 million ransomware attacks in the first six months of 2021, compared with 121.5 million during the same period last year. This year, 227.3 million of those attacks occurred in the United States.<\/p>\n<p>\u201cThe number is concerning considering only half of the year has passed and we already know it is the worst result yet,\u201d the researchers wrote. \u201cRansomware has continued to soar because more businesses are willing to pay a ransom to get their data back. That lets hackers know that their methods are working and launching attacks will allow them to earn a quick buck.\u201d<\/p>\n<p>Fortinet&#8217;s <a href=\"https:\/\/www.fortinet.com\/content\/dam\/maindam\/PUBLIC\/02_MARKETING\/08_Report\/report-2021-threat%20landscape.pdf\">midyear threat landscape report<\/a> released today found that ransomware activity is up tenfold from a year ago.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19043\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/Ransomware-rates.png\" alt=\"growing ransomware attacks\" width=\"894\" height=\"790\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-rates.png 894w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-rates-300x265.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-rates-768x679.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-rates-150x133.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-rates-696x615.png 696w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><\/p>\n<h2>Filling the Void<\/h2>\n<p>The shutting down of operations by ransomware groups like REvil and DarkSide also has given other bad actors room to roam, which has fueled a resurgence in the LockBit <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware-as-a-service<\/a> (RaaS), with the most recent high-profile attack <a href=\"https:\/\/www.esecurityplanet.com\/networks\/accenture-ransomware-attack\/\">being on global consulting firm Accenture<\/a> that sought a ransom of about $50 million. Organizations in such countries as Italy, Taiwan and the UK also have been targeted by LockBit 2.0, the latest version of the ransomware, according to a <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/lockbit-resurfaces-with-version-2-0-ransomware-detections-in-chi.html\">report<\/a> this week by cybersecurity vendor TrendMicro. LockBit attackers have also looked for inside help by installing wallpaper on compromised PCs offering a cut of ransomware payments for people inside companies providing access to a system.<\/p>\n<p>In the case involving Abnormal Security, Hassold said the vendor\u2019s technologies identified and blocked messages sent to several of the vendor\u2019s customers from a bad actor making the offer to senior executives. In the message sent, the bad actor implied he had ties to the DemonWare ransomware group. The malware, which also is known as Black Kingdom and DEMON, has been around for a few years and is available for free on GitHub.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\">How Zero Trust Security Can Protect Against Ransomware<\/a><\/p>\n<h2>Conversation with a Bad Actor<\/h2>\n<p>The email also gave two ways a person interested in the offer could contact the bad actor, either through Outlook mail or the Telegram social media platform. Hassold did, creating a fictitious profile and then reaching out via Telegram.<\/p>\n<p>Over the course of several days of online conversation, Hassold was able to talk the person into sending what turned out to be a file named \u201cWalletconnect (1).exe\u201d containing the ransomware. The amount of the planned ransom demand changed, dropping from $2.5 million to as low as $120,000.<\/p>\n<p>Regarding the ransomware, \u201cat one point in the conversation, we asked the actor if he had created the ransomware himself or if he was just using it. The actor told us that he \u2018programmed the software using python language,\u2019\u201d he wrote in the blog post. \u201cIn reality, however, all of the code for DemonWare is freely available on GitHub. &#8230; In this case, our actor simply needed to download the ransomware from GitHub and socially engineer someone to deploy the malware for them.\u201d<\/p>\n<p>The use of the DemonWare malware \u201cdemonstrates the appeal of ransomware-as-a-service, as it lowers the barrier of entry for less technically-sophisticated actors to get into the ransomware space,\u201d Hassold wrote.<\/p>\n<p>The bad actor told Hassold that he initially sent senior-level executives at the targeted companies phishing emails in hopes of compromising their accounts, but after that failed, he turned to trying to lure employees to unleash the ransomware themselves.<\/p>\n<h2>Threat Traced to Nigeria<\/h2>\n<p>Eventually Abnormal Security was able to link the email to a person in Nigeria who told Hassold that he was working to build a social network called Sociogram, going as far as giving Abnormal Security a link to his LinkedIn page.<\/p>\n<p>\u201cKnowing the actor is Nigerian really brings the entire story full circle and provides some notable context to the tactics used in the initial email we identified,\u201d Hassold wrote. \u201c For decades, West African scammers, primarily located in Nigeria, have perfected the use of social engineering in cybercrime activity. While the most common cyber attack we see from Nigerian actors (and most damaging attack globally) is business email compromise (BEC), it makes sense that a Nigerian actor would fall back on using similar social engineering techniques, even when attempting to successfully deploy a more technically sophisticated attack like ransomware.\u201d<\/p>\n<p>In a <a href=\"https:\/\/krebsonsecurity.com\/2021\/08\/wanted-disgruntled-employees-to-deploy-ransomware\/\">blog post<\/a>, security threat researcher Chris Krebs wrote that \u201ccybercriminals trolling for disgruntled employees is hardly a new development. Big companies have long been worried about the very real threat of disgruntled employees creating identities on darknet sites and then offering to trash their employer\u2019s network for a fee.\u201d<\/p>\n<p>Krebs added that \u201cseveral established ransomware affiliate groups that have recently rebranded under new banners\u00a0seem to have done away with the affiliate model in favor of just buying illicit access to corporate networks.\u201d<\/p>\n<p>John Hellickson, cyber executive advisor at cybersecurity consultancy Coalfire, told <em>eSecurity Planet<\/em> trawling for disgruntled employees \u201cis an interesting and creative tactic to go after another potential weak link in an organization&#8217;s security defenses, but it&#8217;s not necessarily new.\u00a0It&#8217;s hard to know how often this tactic has been used, but it&#8217;s not as prevalent as simple phishing or targeted attacks that have less human-to-human interactions to get a desired malicious outcome.\u201d<\/p>\n<p>This probably won\u2019t be a significant contributor to the insider threat calculation now, but \u201cit shouldn&#8217;t be discounted as something that couldn&#8217;t happen at any given organization.\u201d<\/p>\n<p>Yaniv Bar-Dayan, co-founder and CEO of Vulcan Cyber, a specialist in vulnerability remediation, told <em>eSecurity Planet<\/em> that the tactic is a new twist on a time-tested approach, adding that \u201csocial engineering and phishing tactics are evolving and being utilized to fuel the access hackers need to access corporate networks. But this is just the start.\u201d<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f10e8e990-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f10e8e990\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f10e8e990\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f10e8e990\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f10e8e990\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f10e8e990\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f10e8e990\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attackers, who use myriad methods to get their malware into the systems of businesses large and small in hopes of pulling down millions of dollars, are now going directly to the source. A researcher with email security solutions vendor Abnormal Security found a threat actor directly emailing employees of a company urging them to [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19044,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[7522,2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31789,31790],"class_list":["post-19041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-insider-threats","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-phishing-and-spear-phishing","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Groups Look for Inside Help | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"In the latest evolution of ransomware tactics, ransomware groups are now trying to recruit disgruntled employees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Groups Look for Inside Help | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"In the latest evolution of ransomware tactics, ransomware groups are now trying to recruit disgruntled employees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T18:38:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png\" \/>\n\t<meta property=\"og:image:width\" content=\"586\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Ransomware Groups Look for Inside Help\",\"datePublished\":\"2021-08-23T18:38:16+00:00\",\"dateModified\":\"2021-08-23T18:38:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\"},\"wordCount\":1213,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png\",\"keywords\":[\"insider threats\",\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\",\"name\":\"Ransomware Groups Look for Inside Help | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png\",\"datePublished\":\"2021-08-23T18:38:16+00:00\",\"dateModified\":\"2021-08-23T18:38:16+00:00\",\"description\":\"In the latest evolution of ransomware tactics, ransomware groups are now trying to recruit disgruntled employees.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png\",\"width\":586,\"height\":255},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Groups Look for Inside Help\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Groups Look for Inside Help | eSecurity Planet","description":"In the latest evolution of ransomware tactics, ransomware groups are now trying to recruit disgruntled employees.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Groups Look for Inside Help | eSecurity Planet","og_description":"In the latest evolution of ransomware tactics, ransomware groups are now trying to recruit disgruntled employees.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-23T18:38:16+00:00","og_image":[{"width":586,"height":255,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Ransomware Groups Look for Inside Help","datePublished":"2021-08-23T18:38:16+00:00","dateModified":"2021-08-23T18:38:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/"},"wordCount":1213,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png","keywords":["insider threats","ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/","url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/","name":"Ransomware Groups Look for Inside Help | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png","datePublished":"2021-08-23T18:38:16+00:00","dateModified":"2021-08-23T18:38:16+00:00","description":"In the latest evolution of ransomware tactics, ransomware groups are now trying to recruit disgruntled employees.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Ransomware-offer.png","width":586,"height":255},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware Groups Look for Inside Help"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19041"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19041"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19044"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19041"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19041"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19041"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}