November 2024 Deep Web and Dark Web Trend Report

November 2024 Deep Web and Dark Web Trend Report

Note

 

This trend report on the deep web and dark web of November 2024 is sectioned into Ransomware, Forums & Black Markets, and Threat Actor. We would like to state beforehand that some of the content has yet to be confirmed to be true.

 

 

Major Issues 
 

 

1. Ransomware

 

 

1.1 RansomHub

 

The ransomware gang RansomHub claimed to have attacked SYM Global, a scooter and small automobile manufacturer based in Taiwan. RansomHub claimed to have stolen 265 GB of confidential data from SYM Global, and released a sample of the stolen data as evidence.

 

SYM Global is a company based in Taiwan, established in 1961. They manufacture cars, motorcycles, mobile products, parts/accessories, molds etc. The company is one of the leading automobile manufacturers in Taiwan and is particularly strong in scooters and small automobiles.

 

SYM Global has a strategic partnership with Hyundai Motor Company in South Korea. Through this partnership, SANYANG (SYM’s official company name) has grown to become a leading car manufacturer in Taiwan. SANYANG promotes the Hyundai brand and sells its products through its own marketing channels. The company also supplies high-quality parts to Hyundai Motor Company, making it a key partner in Hyundai’s global strategy.

 

On November 1, 2024, the RansomHub gang listed SYM Global as a victim on their Dedicated Leak Site (DLS). The gang usually gives victims a week to respond before publicly releasing the stolen data, which is a common strategy used by ransomware gangs to pressure victims.


Table 1. Ransomware Group’s Tactic Type

 

Analyzing the data disclosure strategy and behavioral psychology of ransomware group, the following can be summarized:

 

 

  • Main Tactics

 

Tactics

Specific Method

Intended Effect

Time pressure Setting time limit
Displaying countdown timer
Forcing rapid decisions 
Setting response time limit
Step-by-step data leak Categorizing data (8-15 Items)
Announcement of sequential release schedule
Continual pressure
Threat of expanding damage
Psychological pressure Threat of data breach
Emphasizing the risk increase by time
Causing stress and anxiety
Inducing quick surrender
Negotiation strategy Conditioned data protection promise
Proposing step-by-step negotiation
Urging for victim’s cooperation
Obtaining financial gain

 

 

  • Psychological and Behavioral Tactics

 

 

Psychological and Behavioral Tactics

Implementation

Expected Effect

Demonstration of control Control of the data disclosure timing
Seizing the initiative
Inducing a sense of powerlessness
Weakening resistance to threats
Creating fear Setting a time limits
Intensifying threats gradually
Weakening judgment
Maximizing anxiety
Creating a sense of urgency Demanding an immediate response
Creating time pressure
Preventing adequate countermeasures
Requiring immediate decision
Gaining the upper hand in negotiations Threatening to increase damage gradually
Setting negotiation terms
Gaining negotiation advantage
Increasing the acceptability of demands
Business approach Communicating professionally
Building transactional relationship
Justifying criminal actions
Disguising trustworthiness

Table 2. Attacker’s Psychological and Behavioral Tactics

 

 

  • Security Expert Recommendations

 

 

Recommendations

Reasons

Implement zero trust principles Lack of trustworthiness in the criminal organization
High probability of data breach
Necessity of countermeasures Regularly back up data in advance
Enhance security measures

Table 3. Recommendations for security professionals on the tactics and psychological behavior of ransomware groups

 

 

 

Ransomware threat actors are highly calculated in their psychological tactics to maximize fear and anxiety in their victims and gain their desired profit. However, security experts advise against trusting these promises. There is no reason to trust the words of these criminals, and in most cases, the threat actors may have already made copies of the data.

 

The RansomHub attack against SYM Global has the following important implications:

 

  • Exposure of manufacturer vulnerabilities

 

It was revealed that companies in the manufacturing industry are vulnerable to cyber attacks. In particular, traditional manufacturing companies were found to have inadequate security measures in place during their digital transformation process.

 

  • Importance of supply chain security

 

This incident highlighted the fact that ransomware attacks against global manufacturers can affect the entire supply chain. It also underscored the need to enhance security across the entire supply chain, including partners and customers.

 

  • The Need for a Ransomware Response System

 

It became evident that a systematic incident response plan is necessary to counteract the strategies employed by ransomware threat actors, such as time pressure tactics and incremental data leaks.

 

The SYM Global attack case of RansomHub clearly demonstrates the severity of modern ransomware threats. Threat actors attempted to manipulate affected companies by applying sophisticated psychological pressure tactics, making it difficult for companies to respond promptly.