• Advertise
  • About us
  • Terms and Conditions
  • Contact us
Thursday, May 14, 2026
Australian Times News
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
Australian Times News
No Result
View All Result
Home News

Holding the world to ransom: the top 5 most dangerous criminal organisations online right now

Kaseya provides software services to thousands of clients around the world. It’s estimated between 800 and 1,500 medium to small businesses may be impacted by the attack, with the hackers demanding US$50 million (lower than the previously reported US$70 million) in exchange for restoring access to data being held for ransom.

The Conversation by The Conversation
07-07-2021 18:09
in News
Photo by Michael Geiger on Unsplash

Photo by Michael Geiger on Unsplash

Roberto Musotto, Edith Cowan University; Brianna O’Shea, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University

On the internet, nobody knows you’re a dog!

These words from Peter Steiner’s famous cartoon could easily be applied to the recent ransomware attack on Florida-based software supplier Kaseya.

Kaseya provides software services to thousands of clients around the world. It’s estimated between 800 and 1,500 medium to small businesses may be impacted by the attack, with the hackers demanding US$50 million (lower than the previously reported US$70 million) in exchange for restoring access to data being held for ransom.

The global ransomware attack has been labelled the biggest on record. Russian cybercriminal organisation REvil is the alleged culprit.

Despite its notoriety, nobody really knows what REvil is, what it’s capable of or why it does what they does — apart from the immediate benefit of huge sums of money. Also, ransomware attacks often involve vast distributed networks, so it’s not even certain the individuals involved would know each other.

Ransomware attacks are growing exponentially in size and ransom demand — changing the way we operate online. Understanding who these groups are and what they want is critical to taking them down.

AlsoRead...

Svitla Systems

Svitla Systems acquires Australia’s Kiandra IT to expand Global Engineering Footprint and Accelerate AI-Driven delivery

11 May 2026
How Clevero is helping Australian Service Businesses compete with Enterprises on a Fraction of the Budget

How Clevero is helping Australian Service Businesses compete with Enterprises on a Fraction of the Budget

28 April 2026

Here, we list the top five most dangerous criminal organisations currently online. As far as we know, these rogue groups aren’t backed or sponsored by any state.

DarkSide

DarkSide is the group behind the Colonial Pipeline ransom attack in May, which shut down the US Colonial Pipeline’s fuel distribution network, triggering gasoline shortage concerns.

The group seemingly first emerged in August last year. It targets large companies that will suffer from any disruption to their services — a key factor, as they’re then more likely to pay ransom. Such companies are also more likely to have cyber insurance which, for criminals, means easy moneymaking.

DarkSide’s business model is to offer a ransomware service. In other words, it carries out ransomware attacks on behalf of other, hidden perpetrator/s so they can lessen their liability. The executor and perpetrator then share profits.

Groups that offer cybercrime-as-a-service also provide online forum communications to support others who may want to improve their cybercrime skills.

This might involve teaching someone how to combine distributed denial-of-service (DDoS) and ransomware attacks, to put extra pressure on negotiations. The ransomware would prevent a business from working on past and current orders, while a DDoS attack would block any new orders.

REvil

The ransomware-as-a-service group REvil is currently making headlines due to the ongoing Kaseya incident, as well as another recent attack on global meat processing company JBS. This group has been particularly active in 2020-2021.

REvil’s HappyBlog web site showing US$70m ransom demand. Author provided

In April, REvil stole technical data on unreleased Apple products from Quanta Computer, a Taiwanese company that assembles Apple laptops. A ransom of US$50 million was demanded to prevent public release of the stolen data. It hasn’t been revealed whether or not this money was paid.

Clop

The ransomware Clop was created in 2019 by a financially-motivated group responsible for yielding half a billion US dollars.

The Clop group’s speciality is “double-extortion”. This involves targeting organisations with ransom money in exchange for a decryption key that will restore the organisation’s access to stolen data. However, targets will then have to pay extra ransom to not have the data released publicly.

Historical examples reveal that organisations which pay a ransom once are more likely to pay again in the future. So hackers will tend to target the same organisations again and again, asking for more money each time.

ClopLeaks website showing directly downloadable ransom files. Author provided

Syrian Electronic Army

Far from a typical cybercrime gang, the Syrian Electronic Army has been launching online attacks since 2011 to promote political propaganda. With this motive, they have been dubbed a hactivist group.

While the group has links with Bashar al-Assad’s regime, it’s more likely made up of online vigilantes trying to be media auxiliary for the Syrian army.

Their technique is to distribute fake news through reputable sources. In 2013, a single tweet sent by them from the official account of the Associated Press, the world’s leading news agency, had the effect of wiping billions from the stock market.

The fake AP tweet from the Syrian Electronic Army. www.theatlantic.com/

The Syrian Electronic Army exploits the fact that most people online have a tendency to interpret and react to content with an implicit sense of trust. And they’re a prime example of how the boundaries between crime and terror groups online are less distinct than in the physical world.

FIN7

If this list could contain a “super villain”, it would be FIN7. Another Russian-based group, FIN7 is arguably the most successful online criminal organisation of all time. Operating since 2012, it mainly works as a business.

Many of its operations have been undetected for years. Its data breaches have exploited cross-attack scenarios, wherein the data breach serves multiple purposes. For example, it may enable extortion through ransom while also allowing the attacker to use data against victims, such as by reselling it to a third party.

In early 2017, FIN7 was alleged to be behind an attack targeting companies providing filings to the US Security and Exchange Commission. This confidential information was exploited and used to obtain ransom which was then invested on the stock exchange.

As such, the groups made huge sums of money by trading on confidential information. The insider trading scheme facilitated by hacking went on for many years — which is why it’s not possible to quantify the exact amount of economic damage. But it’s estimated to be well over US$1 billion.

Organised crime vs organised criminals

When it comes to complex criminal organisations, techniques evolve and motives vary.

The way they organise themselves and commit crimes online is very different from your local offline gang. Ransomware can be launched from anywhere in the world, so it’s very difficult to prosecute these criminals. Matters are made even more complicated when several parties coordinate across borders.

It’s no wonder the challenge for law enforcement agencies is significant. It’s crucial that authorities investigating an attack are sure it was indeed perpetrated by who they suspect. But to know this, they need all the help they can get.


Roberto Musotto, Research fellow, Edith Cowan University; Brianna O’Shea, Lecturer, Ethical Hacking and Defense, Edith Cowan University, and Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Tags: SB001
DMCA.com Protection Status

SUBSCRIBE to our NEWSLETTER

[mc4wp_form id=”2384248″]

Don't Miss

Svitla Systems acquires Australia’s Kiandra IT to expand Global Engineering Footprint and Accelerate AI-Driven delivery

by Pauline Torongo
11 May 2026
Svitla Systems
Business & Finance

Acquisition marks Svitla’s entry into the Australian market and strengthens capabilities in low-code, Microsoft technologies, and enterprise software engineering.

Read moreDetails

Residential Healthcare Practices: Revolution or Evolution?

by Pauline Torongo
11 May 2026
Residential Healthcare Practices: Revolution or Evolution?
Lifestyle

President Bill Lutz’s "revolution" was born from his background in fine dining, which instilled a disciplined, customer-focused approach.

Read moreDetails

Medicana Health Group launches HPV vaccination campaign to support cervical cancer prevention

by Pauline Torongo
28 April 2026
Medicana Health Group launches HPV vaccination campaign to support cervical cancer prevention
Health & Wellness

The Türkiye-based healthcare group has introduced a new awareness campaign focused on HPV vaccination, regular check-ups and early detection, with...

Read moreDetails

How Clevero is helping Australian Service Businesses compete with Enterprises on a Fraction of the Budget

by Pauline Torongo
28 April 2026
How Clevero is helping Australian Service Businesses compete with Enterprises on a Fraction of the Budget
Business & Finance

By consolidating CRM, scheduling, workflow automation, invoicing, reporting, and client communications into a single platform, Clevero gives smaller operators the...

Read moreDetails

How CJAM Group is building 1,100 homes across Southeast Queensland

by Pauline Torongo
24 March 2026
How CJAM Group is building 1,100 homes across Southeast Queensland
Lifestyle

The CJAM Group founder is quietly building a 1,100+ home pipeline, with projects in Hervey Bay and Toowoomba, using a...

Read moreDetails

Design Without Compromise: Where Gutter Protection Meets Modern Architecture

by Fazila Olla-Logday
20 March 2026
Design Without Compromise: Where Gutter Protection Meets Modern Architecture
Business & Finance

Design without compromise by integrating gutter protection seamlessly into modern architecture. Discover how innovative gutter systems enhance your home’s aesthetics...

Read moreDetails

How WageSafe Secured Australia’s Most Reputable Retail Business Among Its Premium Clients

by Fazila Olla-Logday
12 March 2026
How WageSafe Secured Australia’s Most Reputable Retail Business Among Its Premium Clients
at

Learn how WageSafe helps businesses stay compliant with payroll and wage regulations through reliable monitoring, risk management, and expert support—protecting...

Read moreDetails
Load More

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

  • About us
  • Write for Us
  • Advertise
  • Contact us
  • T&Cs, Privacy and GDPR
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status