$75 Million Ransom Exploitation: Dark Angels Ransomware Hits Record

A record-breaking $75 million ransom was recently paid to the infamous cybercriminal outfit known as Dark Angels Ransomware, making headlines.

dark angles

In the history of ransomware attacks, the payment of a $75 million ransom sets a record. This stunning sum shows the growing confidence of cybercriminals and their ability to take advantage of weak prey in order to make large sums of money.

The fact that the victim chose to pay so much shows how dangerous it is to have inadequate backups or other options in case the encrypted data needs to be restored. Concerns and Implications The record-breaking ransom payment that followed the Dark Angels ransomware outbreak raises a number of issues and effects for both individuals and organisations.

Understanding Dark Angels Team ransomware

The Dark Angels Team ransomware-like programme was found by pcrisk researchers when they were reviewing fresh submissions to VirusTotal. Based on our analysis, this malicious software is a member of the Babuk ransomware family.

We discovered that it encrypts files and appends the “.crypt” extension to their filenames after running a sample on our test system. For instance, all of the impacted files had the initial file name “1.jpg” appearing as “1.jpg.crypt,” “2.png” as “2.png.crypt,” and so on.

The ransom letter “How_To_Restore_Your_Files.txt” was placed onto the desktop by this ransomware once the encryption process was finished. A link to a Tor website, which displayed content identical to the ransom letter, was placed in this file. It is clear from these communications that Dark Angels Team targets businesses rather than individual consumers.

Screenshot of files encrypted by the ransomware Dark Angels Team:

 Dark Angels
Malware Analyisis Of How_To_Restore_Your_Files.txt

Target
How_To_Restore_Your_Files.txt

Size
1KB

MD5
59b88fd446ba78a90840a98c094117e3

SHA1
875fb952328dcbf0b6c2312ec6ee7d650fcfc29c

SHA256
fdde6eab66d83fb89dcf102ab9688f0141f26ace707b0f319d3fd88c2d3e1363

SHA512
5c3235c9e1059a5cd97ffddd6da05a4f31cb45a739fd5c73317ca19f2778f7a8c0ffaee8d0bc3bf45851c4e8e8f0ba24c4285fb8570a505212ab556da8ddf2c7

Score
1/10

Malware Config
Signatures
Opens file in notepad (likely ransom note) 1 IoCs
ransomware
Processes
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\How_To_Restore_Your_Files.txt

An unusual ransom payment

Crypto intelligence firm Chainalysis, which tweeted about this payment on X, further verified this record breaking amount.

Zscaler stated the company was in the Fortune 50 and the incident happened in early 2024, but they did not reveal which corporation paid the $75 million ransom.

In addition, the threat actors run a website called “Dunghill Leaks” where they blackmail people by threatening to release data unless they pay a ransom.

“The Dark Angels group employs a highly targeted approach, typically attacking a single large company at a time,”

 Zscaler ThreatLabz researchers.

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top