DoppelPaymer Ransomware

Caleb Boma | April 29th, 2021

 

DoppelPaymer ransomware group leaked a massive collection of files from the Illinois Office of the Attorney General. The Office has decided not to pay the ransom which explains the reason for the leak we’re now seeing.

DoppelPaymer Ransomware Leaked Files

The PII (personally identifiable information) relates to state prisoners, grievances, court files, and cases. The DoppelPaymer ransomware attack on April 10 was disclosed on April 13.

DoppelPaymer negotiations usually don’t get very far due to sanctioned entities by the Department of Justice. Since many security researchers link the DoppelPaymer ransomware to the sanctioned Evil Corp group, paying DoppelPaymer requests can result in fines or further legal implications.

DoppelPaymer derives from BitPaymer ransomware and became a critical threat in 2019 as they’ve successfully carried out attacks on a number of high-profile victims. Their initial tactics were locking and encrypting files on victim machines, but they’ve changed the approach to a more popular tactic among all threat actors of threatening to leak stolen data.

DoppelPaymer uses a tool called Process Hacker in order to terminate services and security protocols, servers, backups, and software to impair defenses and evade detection.

SpearTip’s engineers specialize in incident response to help organizations steer clear of cyber threats. If your business endures an attack, call our security operations center. We have engineers ready to assist with data recovery, threat mitigation, and overall IT remediation. Your data should be viewed as a valuable asset to the company, so it’s crucial to recover and protect it.

In addition to our incident response capabilities, we provide organizations with continuous monitoring through our security operations as a service (SOCaaS). There is no comparison to being able to communicate with highly technical, certified engineers when your organization faces a cybersecurity issue. Attacks on government agencies at the local and state levels have been relevant lately as Babuk ransomware operators attacked a DC police department and threatened to release the data they exfiltrated.

Our team will continuously monitor environments 24/7 in our US-based Security Operations Center. Our certified engineers work in unison with our proprietary endpoint detection and response tool, ShadowSpear®. This allows your organization to have direct communication with our engineers at any moment and a completely transparent view of your risk profile.

If you think your organization has been breached, call our Security Operations Center at 833.997.7327.

Categories

Connect With Us

Featured Articles

New Loop DoS Attack
New Loop DoS Attack Affecting Linux Systems
19 April 2024
Possible Cyberattack
Possible Cyberattack During 2024 Summer Olympics
15 April 2024
Tabletop Exercises
Tabletop Exercises: Transformative Impact on Companies
12 April 2024
Vulnerability Assessments
Vulnerability Assessments: Why It's Imperative in Digital Landscape
10 April 2024

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.