Ransomware from inside The internal threat and the RaaS model

Published 3 min de lectura 137 reading

The recent verdict against two cybersecurity professionals involved in attacks with the Ransomware known as BlackCat (ALPHV) highlights a disturbing reality: not only are there sophisticated external threats, but they can also come from those who should protect us. The accused, who worked in companies in the sector and agreed to distribute a percentage of the rescue with the Ransomware operators, combined technical knowledge and privileged access to violate systems and extort victims in the United States.

Beyond judicial history - which describes the payment of bailouts in Bitcoin, the subsequent laundering of funds and the abuse of internal functions to inflate negotiations - the main lesson is that Ransomware- as- a- Service (RaaS) model allows actors with different roles to work together to maximize illegal profits. Although specific groups may disappear or change their names, the technical and economic scheme persists and evolves, which requires both organizational and regulatory responses.

Ransomware from inside The internal threat and the RaaS model
Image generated with IA.

From the point of view of risk management, there are several immediate implications: the need to strengthen confidence in third parties and contractors, to review privileges and access of staff with high technical capacity, and to improve the monitoring of those involved in negotiations or incident responses. It is also clear that the existence of cyberinsurance policies can become an exploitable variable by internal and external actors, so information on limits and conditions should be handled with extreme care.

At the technical level, traditional defences remain necessary but not sufficient. It is essential to combine proven and isolated backup, network segmentation, minimum privilege principle, multifactor authentication and modern endpoint detection and response solutions (EDR). Also, keeping an updated asset inventory and applying patches as a priority reduces the attack area that RaaS groups often take advantage of.

For organizations that manage the response to incidents, it is appropriate to establish clear procedures on who can negotiate, what information is shared and how each step is documented, always involving legal advice and security forces when appropriate. Negotiations without transparency or with internal actors providing sensitive data increase the risk of higher payments and subsequent legal implications.

Ransomware from inside The internal threat and the RaaS model
Image generated with IA.

In the area of recruitment and human resources, companies should expand risk assessments by recruiting critical technical profiles: background checks, continued privilege controls, job separation policies and monitoring of unusual activities. Ethical and security training for personnel with advanced capabilities can reduce the likelihood of deliberate abuse.

Judicial action against these individuals is a reminder that the fight against cybercrime requires coordination between the private sector and the authorities, as well as transparency in reporting incidents to prevent malicious actors from repeating effective tactics. Official resources on Ransomware prevention and response provide practical guidance for review and implementation: for example, the CISA recommendations on Ransomware https: / / www.cisa.gov / ransomware and general information on FBI cyber research https: / / www.fbi.gov / investigate / cyber.

Finally, for any organization, the recommendation is clear: not delegating confidence in mere credentials or technical experience without compensatory controls, strengthening the governance of access and responses, and designing resilience plans to restore operations without succumbing to blackmail. The combination of preventive measures, early detection and cooperation with authorities reduces both the economic attractiveness of attacks and the ability of internal actors to become facilitators of crime.

Coverage

Related

More news on the same subject.