2022-02-11 07:40:34 +01:00
{
"namespace" : "ransomware-roles" ,
"expanded" : "Ransomware Actor Roles" ,
"description" : "The seven roles seen in most ransomware incidents." ,
"refs" : [
2022-02-22 15:38:07 +01:00
"https://www.northwave-security.com/"
2022-02-11 07:40:34 +01:00
] ,
"version" : 1 ,
"predicates" : [
{
2022-02-16 12:57:04 +01:00
"value" : "1 - Initial Access Broker" ,
"expanded" : "1 - Initial Access Broker" ,
2022-02-11 07:40:34 +01:00
"description" : "Initial Access Brokers obtain the initial access to organizations. They monetize this access by offering it for sale to any actor."
} ,
{
2022-02-16 12:57:04 +01:00
"value" : "2 - Ransomware Affiliate" ,
"expanded" : "2 - Ransomware Affiliate" ,
2022-02-16 13:09:51 +01:00
"description" : "Ransomware affiliates are responsible for obtaining control of a victim's network and monetizing it. They perform reconnaissance of the network as well as privilege escalation, and are responsible for destroying any backup options and deployment of ransomware. Ransomware Affiliates can make use of different ransomware families in different attacks."
2022-02-16 12:57:04 +01:00
} ,
{
"value" : "3 - Data Manager" ,
"expanded" : "3 - Data Manager" ,
2022-02-16 13:09:51 +01:00
"description" : "Data managers are responsible for exfiltrating data as well as managing and leaking that exfiltrated data when necessary."
2022-02-16 12:57:04 +01:00
} ,
{
"value" : "4 - Ransomware Operator" ,
"expanded" : "4 - Ransomware Operator" ,
"description" : "Ransomware Operators facilitate the ransomware business model by providing ransomware and hosting the infrastructure needed to run it."
} ,
{
"value" : "5 - Negotiator" ,
"expanded" : "5 - Negotiator" ,
2022-02-16 13:09:51 +01:00
"description" : "Negotiators are responsible for interacting with the victim and coming to an agreement with the victim regarding the ransom payment."
2022-02-16 12:57:04 +01:00
} ,
{
"value" : "6 - Chaser" ,
"expanded" : "6 - Chaser" ,
2022-02-16 13:09:51 +01:00
"description" : "Chasers put pressure on the victim by emailing and calling key employee. Chasers threaten these employees with continued attacks or publication of confidential data if the ransom is not payed."
2022-02-16 12:57:04 +01:00
} ,
{
"value" : "7 - Accountant" ,
"expanded" : "7 - Accountant" ,
"description" : "Accountants launder the ransom."
2022-02-11 07:40:34 +01:00
}
]
}