The Dark Angels Team ransomware group, first identified in May 2022, is a notable threat actor specializing in double extortion tactics. Their strategy involves encrypting victims’ data and demanding a ransom for both the decryption key and the non-release of stolen data. The group initially focused on Windows-based systems, using a payload derived from the leaked Babuk ransomware source code. This payload is designed to inhibit system recovery processes and terminate any operations that might interfere with the encryption process.
They Started To Expand
In 2023, the group expanded its operations to include Linux/ESXi systems, targeting various industries such as healthcare, government, finance, and education. The Linux/ESXi variant of their ransomware is distinct from their Windows payload, built on a different codebase similar to RagnarLocker. It utilizes AES with a 256-bit key for file encryption and logs the encryption progress to a hardcoded log file.
The Dark Angels Team ransomware is highly targeted, often customizing its payloads for specific victims, as evidenced by its attacks on notable companies like Johnson Controls. Their attack methodology on Windows systems includes spreading the ransomware across networked machines, though the process is time-consuming and less efficient compared to other ransomware groups. Detection and mitigation of Dark Angels Team ransomware require a multi-layered approach.
A Record-Breaking Payout
In early 2024, the Dark Angels ransomware gang made headlines by extorting a record-breaking $75 million ransom from a Fortune 50 company. This unprecedented ransom payment, which is the largest publicly known to date, was uncovered by Zscaler ThreatLabz and confirmed by crypto intelligence firm Chainalysis. Although the identity of the company was not disclosed by Zscaler, it is widely speculated that the victim may have been Cencora, a pharmaceutical giant ranked #10 on the Fortune 50 list, which suffered a cyberattack in February 2024. However, this has not been officially confirmed.
What Makes This Group Dangerous
The Dark Angels ransomware group is particularly dangerous due to several key factors that set them apart from other cybercriminal organizations. One of the most significant aspects of their operations is their “Big Game Hunting” strategy, where they focus on attacking large, high-value targets such as Fortune 50 companies, rather than smaller, more frequent targets. This strategy allows them to demand incredibly high ransom amounts, as evidenced by the record-breaking $75 million ransom they secured from one such company in 2024. By concentrating on fewer but more lucrative victims, they maximize the financial impact of each attack, which makes them a substantial threat to major corporations.
Double Extortion
Another factor that makes Dark Angels especially dangerous is their use of the double extortion tactic. They not only encrypt the victim’s data and lock them out of critical systems but also exfiltrate sensitive information before starting the encryption process. The group then uses this stolen data as leverage, threatening to release or sell it publicly if the ransom isn’t paid. This approach adds immense pressure on victims to comply with their demands. Moreover, this dual-threat strategy not only cripples the operational capabilities of the targeted organizations but also exposes them to significant reputational damage and regulatory penalties, raising the stakes even higher.
Has Continued To Evolve And Adapt
Dark Angels also stands out for its sophisticated technical capabilities. Originally using the Babuk ransomware code for their attacks, they have since evolved and developed their own customized Linux encryptor, similar to RagnarLocker. This evolution demonstrates their adaptability and technical proficiency in targeting various operating systems, including VMware ESXi and Linux environments, which are crucial for many large enterprises. Their ability to breach corporate networks, move laterally, and gain administrative access makes them highly effective at deploying their ransomware across large infrastructures.
A Strong Organizational Structure
Furthermore, Dark Angels has a strong organizational structure, with the ability to systematically plan and execute attacks over extended periods. They don’t strike immediately upon gaining network access; instead, they take the time to map out networks, identify high-value data, and position themselves to cause maximum disruption. Their use of a data leak site named “Dunghill Leaks” further increases the pressure on their victims, as it allows them to publicly expose compromised data if their demands are unmet.
This combination of strategic targeting, technical sophistication, and psychological manipulation through double extortion tactics makes Dark Angels one of the most dangerous ransomware groups operating today. Their success in securing massive ransoms, coupled with their ability to evolve their methods and infrastructure, poses a severe threat to corporations and critical industries worldwide.
Who is Cencora?
Cencora, formerly known as AmerisourceBergen, leads as a global healthcare solutions company, playing a critical role in distributing and delivering pharmaceutical products and healthcare services. The company rebranded to Cencora in 2023, signaling its commitment to offering a broader range of services beyond pharmaceutical distribution. These services include global commercialization, patient support, and healthcare logistics. Headquartered in Conshohocken, Pennsylvania, Cencora ranks among the Fortune 50 companies, underscoring its importance in the healthcare sector and its vast influence on the global healthcare supply chain.
A Distributor In Pharmaceuticals
Cencora operates in numerous countries, serving as a crucial link between pharmaceutical manufacturers and healthcare providers, including hospitals, pharmacies, and clinics. The company ensures that essential medications and healthcare products are delivered efficiently and safely to their destinations, often under strict regulatory conditions. Additionally, Cencora manages the distribution of complex therapies, biologics, and specialty drugs that require specialized handling and storage.
They Offer Healthcare Service
In addition to its distribution services, Cencora offers a suite of healthcare solutions that include consulting, patient access programs, and support services aimed at improving patient outcomes and optimizing healthcare delivery. The company collaborates closely with pharmaceutical companies to bring new therapies to market, providing expertise in regulatory compliance, market access, and commercialization strategies. This makes Cencora a key partner in the pharmaceutical supply chain, helping to navigate the complexities of global healthcare markets.
Cencora also plays a significant role in supporting patient care through its various programs designed to enhance medication adherence, patient education, and disease management. These programs are crucial in ensuring that patients not only have access to the medications they need but also receive the necessary support to manage their conditions effectively.
Their Data Leak Site
Dark Angels operates a data leak site called “Dunghill Leaks,” where they threaten to release stolen data if the ransom goes unpaid. Their sophisticated and highly targeted approach, combined with substantial ransom demands, establishes them as one of the most dangerous ransomware groups in operation today. This method sets a troubling precedent for future attacks. Additionally, the $75 million ransom payment is likely to inspire other cybercriminals to mimic their success, further increasing the vulnerability of high-value companies to similar attacks.
How Companies Can Protect Themselves
Large companies must adopt a comprehensive and multi-layered approach to protect themselves against sophisticated ransomware groups like Dark Angels. The increasing complexity and targeted nature of ransomware attacks necessitate proactive and robust cybersecurity strategies that go beyond basic defenses.
Multi-factor Authentication
One of the foundational steps to protect against these threats is to implement strong access controls and multi-factor authentication (MFA) across all systems. By limiting access to critical systems and data to authorized personnel and requiring multiple forms of verification, companies can significantly reduce the risk of unauthorized access. This step is especially important since ransomware groups often exploit weak passwords or compromised credentials to gain initial entry into corporate networks.
Regular Patching And Updating
Regularly patching and updating systems is another crucial defense measure. Cybercriminals often exploit known vulnerabilities in software and hardware to launch attacks. By maintaining an up-to-date patch management program, companies can proactively close these security gaps before cybercriminals exploit them. This approach should cover not only the operating systems and applications but also any third-party tools and frameworks within the company’s IT environment.
Training Of Employees
In addition to these technical defenses, companies must prioritize employee training and awareness to prevent ransomware attacks. Employers should train their staff to recognize phishing emails, suspicious attachments, and other common tactics used by cybercriminals to breach networks. Moreover, implementing regular security awareness programs helps ensure that employees remain vigilant and informed about the latest threats, significantly reducing the risk of attacks caused by human error.
Network Segmentation
Network segmentation is another effective strategy that can limit the spread of ransomware within an organization. By dividing the network into distinct segments and restricting communication between them, companies can prevent ransomware from moving laterally across the network if an initial breach occurs. This containment strategy is crucial in minimizing the impact of an attack and protecting critical assets.
Backup Files
Additionally, companies must implement a robust backup and disaster recovery plan. Regularly backing up data to secure, offline locations ensures that, in the event of a ransomware attack, the company can restore its systems without paying the ransom. Furthermore, companies should frequently test these backups to guarantee they can be restored quickly and effectively when needed.
Finally, advanced threat detection and response solutions are essential for monitoring networks for signs of malicious activity. These solutions, often powered by artificial intelligence and machine learning, can detect unusual patterns of behavior that may indicate a ransomware attack in progress. By promptly identifying and responding to threats, companies can mitigate the damage and prevent the attack from escalating.
Legal Consequences If They Were Caught
If authorities apprehend the Dark Angels ransomware group, they will face severe legal consequences, reflecting the gravity of their crimes. Cybercriminals involved in ransomware attacks face various charges at both national and international levels, depending on the jurisdictions and the extent of their operations.
Computer Fraud And Abuse
At the core, authorities could charge members of the Dark Angels group with computer fraud and abuse, which involves accessing computer systems without authorization to commit crimes like theft, extortion, and data breaches. Many countries impose heavy penalties for this crime, including lengthy prison sentences, because it poses a serious threat to public safety and national security. For example, in the United States, the Computer Fraud and Abuse Act (CFAA) imposes significant penalties, including up to 20 years in prison for offenses that cause substantial harm.
Cyber Extortion
Since the group engages in extortion, authorities would also charge them with cyber extortion, which involves threatening to cause damage or release sensitive information unless a ransom is paid. This offense is a major felony in many jurisdictions, often resulting in additional prison time and substantial fines. Moreover, their use of ransomware to encrypt and hold data hostage worsens the severity of these charges, especially when they target critical infrastructure or large corporations, as the Dark Angels group has done.
Money Laundering
The group’s activities could also lead to money laundering charges, especially if they used cryptocurrency to hide the origins of their illicit gains. Additionally, authorities worldwide have increasingly focused on tracking and prosecuting individuals who use digital currencies to launder money from illegal activities. As a result, convictions for money laundering can lead to decades of imprisonment and the forfeiture of assets.
Can Be Viewed As Terrorism
If their attacks cause significant financial losses, damage critical infrastructure, or endanger lives, prosecutors could bring additional charges against members of the Dark Angels group under anti-terrorism or national security laws. Moreover, some jurisdictions classify cyberattacks on critical infrastructure as acts of terrorism, which can lead to the most severe penalties, including life imprisonment or, in extreme cases, the death penalty in countries that still practice it.
Conspiracy Charges May Stick
Authorities could also bring conspiracy charges against the group, especially if they determine that the group collaborated with other criminal organizations or individuals. Furthermore, conspiracy to commit cybercrimes often carries penalties similar to those for the crimes themselves, as it involves actively planning and coordinating illegal activities.
Could Face INTERPOL Or Europol
If members of the Dark Angels group operate across multiple countries, they could face extradition to answer charges in various jurisdictions. International cooperation through organizations like INTERPOL or Europol is crucial in ensuring they are brought to justice. Moreover, prosecuting international cybercriminals often involves complex, multi-national investigations and trials, leading to significant legal consequences.
Need Help? Call Us Now!
Do not forget that when you or anyone you know is facing a criminal charge, you have us, the Law Office of Bryan Fagan, by your side to help you build the best defense case for you. We will work and be in your best interest for you and we will obtain the best possible outcome that can benefit you.
Our team is here to explain your trial, guiding you through the criminal justice process with clarity and support every step of the way. If you’re navigating the complexities of criminal charges and the court system seems daunting, reach out.
Therefore, do not hesitate to call us if you find yourself or someone you know that is facing criminal charges unsure about the court system. We will work with you to give you the best type of defense that can help you solve your case. It is vital to have someone explain the result of the charge to you and guide you in the best possible way.
Here at the Law Office of Bryan Fagan, our professional and knowledgeable criminal law attorneys build a defense case that suits your needs, aiming for the best possible outcome to benefit you.
Also, here at the Law Office of Bryan Fagan, you are given a free consultation at your convenience. You may choose to have your appointment via Zoom, google meet, email, or an in-person appointment; and we will provide you with as much advice and information as possible so you can have the best possible result in your case.
Call us now at (281) 810-9760.
Other Related Articles
Cybersecurity and Data Privacy Laws: Protecting Your Business and Clients
The Amazon Killer: Todd Kohlhepp
Drug Deal To Deadly Crime: A Daring Robbery Goes Wrong
Held Hostage in the Digital Age: The Growing Threat of Ransomware
Dark Angels Ransomware Group – FAQs
Select a question from the dropdown below to reveal the answer:
Hey there! My name is Olivia Ramirez, I graduated from Sam Houston State University with a bachelor’s of science in Psychology. I can’t help but scour the web for crime news and interesting stories. I write mostly true crime, anything from white collar crimes to the tragic murders across America. I try to mix in local news updates with big hitting scandals.
When I’m not typing away or searching for crime news, you’ll find me in bookstores looking for the new books to add to my backlog. Hanging out with my family or just relaxing with some cozy games to unwind from the day.