{"id":23413,"date":"2023-11-17T12:10:51","date_gmt":"2023-11-17T20:10:51","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/17\/news-17143\/"},"modified":"2023-11-17T12:10:51","modified_gmt":"2023-11-17T20:10:51","slug":"news-17143","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/17\/news-17143\/","title":{"rendered":"Ransomware gang files SEC complaint about victim"},"content":{"rendered":"\n<p>In what seems to be a new twist on the ransomware theme, the notorious ALPHV\/BlackCat ransomware group has filed a complaint with the US Securities and Exchange Commission (SEC) about the software company MeridianLink.<\/p>\n<p>ALPHV is one of the most active ransomware-as-a-service (RaaS) operators and regularly appears in our <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/11\/ransomware-review-november-2023\">monthly ransomware reviews<\/a>. MeridianLink supplies &#8220;digital lending solutions&#8221; to banks, credit unions, fintechs, and other financial institutions.<\/p>\n<p>Since September 5, 2023 the SEC has required public companies to <a href=\"https:\/\/www.sec.gov\/files\/rules\/final\/2023\/33-11216.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">disclose within four days all cybersecurity breaches<\/a> that could impact their bottom lines. Apparently ALPHV is aware of the new rules and in this screenshot of the SEC complaint form it wrote:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"903\" height=\"211\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/leaksite_3.png\" alt=\"screenshot SEC form\" class=\"wp-image-97755\" \/><\/figure>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cWe want to bring to your attention a concerning issue regarding MeridianLink\u2019s compliance with the recently adopted cybersecurity incident disclosure rules.<\/p>\n<p>It has come to our attention that MeridianLink, in light of a significant breach compromising customer data and operational information, has failed to file the requisite disclosure under Item 1.05 of Form 8-K within the stipulated four business days, as mandated by the new SEC rules.\u201d<\/p>\n<\/blockquote>\n<p>The referenced item (Form 8-K Item 1.05) states:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cRegistrants must disclose any cybersecurity incident they experience that is determined to be material, and describe the material aspects of its:<\/p>\n<p>&#8211; Nature, scope, and timing; and<\/p>\n<p>&#8211; Impact or reasonably likely impact.<\/p>\n<p>An Item 1.05 Form 8-K must be filed within four business days of determining an incident was material. A registrant may delay filing as described below, if the United States Attorney General (\u201cAttorney General\u201d) determines immediate disclosure would pose a substantial risk to national security or public safety.<\/p>\n<p>Registrants must amend a prior Item 1.05 Form 8-K to disclose any information called for in Item 1.05(a) that was not determined or was unavailable at the time of the initial Form 8-K filing. \u201c<\/p>\n<\/blockquote>\n<p>As you can see, there are possible exceptions and for all we know, the investigation into the nature and gravity of the data breach is still ongoing. Or far from as material as ALPHV wants us to believe.<\/p>\n<p>In a <a href=\"https:\/\/www.databreaches.net\/alphv-files-an-sec-complaint-against-meridianlink-for-not-disclosing-a-breach-to-the-sec\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">statement to databreaches.net<\/a> MeridianLink &nbsp;said:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cSafeguarding our customers\u2019 and partners\u2019 information is something we take seriously. MeridianLink recently identified a cybersecurity incident that took place on Nov 10. Upon discovery on the same day, we acted immediately to contain the threat and engaged a team of third-party experts to investigate the incident. Based on our investigation to date, we have identified no evidence of unauthorized access to our production platforms, and the incident has caused minimal business interruption.<\/p>\n<p>We have no further details to offer currently, as our investigation is ongoing.\u201d<\/p>\n<\/blockquote>\n<p>Apparently the ransomware operators like to pretend that what they are doing is their civic duty. This tile is posted on the landing page of the gang&#8217;s leak site.<\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"787\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/meridian-link-on-the-alphv-dark-web-site.jpg?w=1024\" alt=\"ALPHV announces that it's filed a complaint with the SEC\" class=\"wp-image-97935\" style=\"width:700px\" \/><figcaption class=\"wp-element-caption\">ALPHV announces that it&#8217;s filed a complaint with the SEC<\/figcaption><\/figure>\n<p>Clicking through, we found the screenshot of the form and a non-explanatory statement why they filled the form out.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cDespite this requirement, MeridianLink has not fulfilled this obligation regarding the breach it experienced a week ago. We have therefore reported this non-compliance by MeridianLink, who was involved in a material breach impacting customer data and operational information, for failure to file the required disclosure with the Securities and Exchange Commission (SEC). It appears MeridianLink reached out, but we are yet to receive a message on their end. Maybe this was their DFIR, Mandiant, who did so without authorization from their client. Whatever the reason is\u2026..we are giving you 24 hours before we publish the data in its entirety.\u201d<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"999\" height=\"821\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/laeaksite_2.png\" alt=\"second screenshot BlackCat leak site\" class=\"wp-image-97757\" \/><\/figure>\n<p>Whatever the reason is behind MeridianLink\u2019s&nbsp;apparent decision not to report the cyber-incident (yet), the action taken by ALPHV certainly is something we haven\u2019t seen before. It may be a warning or an attempt to gain extra leverage. Knowing how hard it can be to determine the scope of a cyberattack in just a few days, we can expect to see this happen more often.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-avoid-ransomware\">How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry.<\/strong>&nbsp;Create a plan for&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a>&nbsp;in internet-facing systems quickly; and disable or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a>&nbsp;like RDP and VPNs.<\/li>\n<li><strong>Prevent intrusions.<\/strong>&nbsp;Stop threats early before they can even infiltrate or infect your endpoints. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a>&nbsp;that can prevent exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions.<\/strong>&nbsp;Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a>&nbsp;to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption.<\/strong>&nbsp;Deploy Endpoint Detection and Response software like&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a>&nbsp;that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.<\/li>\n<li><strong>Create offsite, offline backups.<\/strong>&nbsp;Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Don\u2019t get attacked twice.<\/strong>&nbsp;Once you&#8217;ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/11\/ransomware-gang-files-sec-complaint-about-target\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The ALPHV\/BlackCat ransomware group has filed a non compliance complant with the SEC against one of its victims. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25303,12534,27147,30517,32,3765],"class_list":["post-23413","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-blackcat","tag-compliance","tag-leak-site","tag-meridianlink","tag-news","tag-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23413"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23413\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23413"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}