<img height="1" width="1" src="https://www.facebook.com/tr?id=1046809342117480&amp;ev=PageView &amp;noscript=1">

VSEC Blog: IT Security Channel News brought to you by Infinigate UK

Share the Infinigate UK Blog on LinkedIn Share the Infinigate UK Blog on Twitter Share the Infinigate UK Blog on Facebook Share the Infinigate UK Blog on Google+ Share the Infinigate UK Blog via Email

What Happened to the World's Most Famous Bitcoin Wallets?

Topics: Ransomware, Cyber-Crime, Cyber Attack, Cybercrime, bitcoin

Posted: 26 July 2017

World Famous Bitcoin Wallets for WannaCry and Petya Ransomware

2017 may be remembered as the year of the botched cyber heist, when mass infections of ransomware variants embarrassed some of the world's largest and most famous organisations but earned their creators little more than notoriety. With mystery surrounding identity and motive, we may never get to the bottom of the full story but we may be able to draw some conclusions by following the money.

WannaCry and the Poisoned Chalice


In May 2017, anyone who hadn't already heard of ransomware was instantly enlightened by news of a global outbreak, involving household names such as the NHS, car manufacturer Nissan and telecoms giant Telefonica. Exploiting a previously disclosed vulnerability in Microsoft Windows operating systems, the ransomware strain known as WannaCry was able to spread to over 230,000 machines worldwide with little resistance. This resulted in the typical encrypted file system and a demand for payment in exchange for a decryption key. In total, there were three bitcoin wallets used in the attack:

At the time of writing, these wallets contained a total of £104,803, with unsurprisingly the greatest increase in deposits taking place in the first few days after the attack. The income from this incident of cybercrime would usually be viewed as motive enough if it were not for the fact that there has been no withdrawal of funds since the attack. There are two possible things we could deduce from this, that the scale of WannaCry and the lime-light it attracted was far greater than intended, resulting in the wallet becoming a poisoned chalice watched by law enforcement in multiple countries; or that monetary gain was never the true purpose of WannaCry and that instead it was designed to cause large scale disruption.

Despite the publicity, it is interesting to note that the WannaCry yield pales in comparison to previous lesser reported attacks, again pointing toward a different non-monetary motive. For example, CryptoWall which in 2014 amassed a fortune of $340 million, and created a separate bitcoin wallet for each victim.

Petya is Pocket Money


The fallout from WannaCry was accompanied by the almost song-like chorus from cybersecurity experts and commentators prophesising that this would not be the last mass-ransomware scale event. They of course proved to be correct. Fast forward to the end of June 2017 and the world was introduced to Petya (one of its many names), a strain of ransomware exploiting the same vulnerability used by WannaCry, with some modifications including the ability to encrypt the MBR (Master Boot Record) and use discovered administrative credentials among others. Based on limited geographical impact and the methods in which it was used to launch, there is much debate and suspicion that Petya was targeted at Ukrainian businesses and organisations and that it used ransomware a mask to hide its intention for disruption. In the case of Petya there is just one known bitcoin wallet:

At its peak this wallet totalled £8,321 which although low can be explained by a sole email address being shut down, preventing any further payments. Interestingly, the Petya bitcoin wallet, unlike WannaCry, has seen some activity.

On the 4th of July, two payments of roughly £200 each were paid to websites Pastebin and DeepPaste following a message on both sites offering the private key to decrypt all Petya encrypted systems in exchange for £200,000 in bitcoin. The message was accompanied by a message signed by the Petya private key, undoubtedly to prove its authenticity. Later, the remainder of the wallets contents were moved to another wallet, possibly to a bitcoin laundering service.

Cloaks, Daggers and Motives


It is likely that we will never get to the bottom of the motive for both of these disruptive ransomware events. The nature of cryptocurrency means that although the ledger of transactions is available for scrutiny, the identities of the wallet owners is not. With return on investment low in both cases, our only source of investigation is more than likely a clever attempt at misdirection anyway.

Ransomware Survival Guide Whitepaper

Infinigate UK
Posted by: Infinigate UK
Share via:
   

Subscribe to VSEC Blog Updates

Terms and Conditions:
  • When completing this form, you are indicating your consent for this processing activity. By doing this you are providing Infinigate UK with lawful consent to process your submitted personal data for one or both of the marketing purposes below:
    • We will use your details to send you blog updates.
    • We will match your answers to areas of interest which believe you have and may send you additional marketing materials related to those areas.
  • We will keep your personal data for nine months, upon which we will delete your personal data unless you have consented to further processing or we have legitimate interests to retain it. You are free to withdraw your consent at any time by contacting our marketing department or using one of our unsubscribe links in our communications.
  • In some cases where you indicate consent for supplying you with additional promotional marketing material, we will share your personal data with one of our reseller partners, should your areas of interest match a solution or service they provide. We instruct all our reseller partners to communicate this data transfer with data subject affected.
  • Your personal data is stored in a marketing automation solution database, access to this is limited to authorised users and all necessary steps to ensure data security is maintained.

For further information about this form, your rights under the General Data Protection Regulation or how to exercise them, please contact Infinigate's marketing department here.

Popular Posts