Menu
Blog

Profiling Team Snatch: Cybercriminal Group Publishes Five New Breaches

Profiling Team Snatch:  Cybercriminal Group Publishes Five New Breaches

Synopsis

In this article we detail the recent activities of Team Snatch, a cybercriminal group first associated with ransomware operations who now partake in more general data theft and exposure beyond simply leveraging ransomware threats. This group previously achieved notoriety in late April 2019 with their publication of data stolen from CityComp, a German IT services company.

In response, Motherboard published an article detailing the breach, including an overview of the attack and information about an onion site used to host the breached data. Picking up where their research left off, we present a timeline of recent attacks by Team Snatch and an analysis of their TTPs and newly published breach data. In the CityComp breach and following attacks, Team Snatch worked with the intent to get money via extortion, posting sensitive and private company data of those that have not met their demands, most likely in hopes of instilling fear in future victims. Briefly, we also compare the team’s known activity to other financial cybercrime actors. In examining the details and attributes of these events, we hope to help the community better understand—and prepare for—risks of similar type.

CityComp Breach

Team Snatch first became mainstream with their breach of the company CityComp, which quickly became national news. With the breach came a publicly accessible listing of CityComp’s data for anyone to download. The reported reason for making the data public was CityComp’s refusal to pay a blackmail fee to the group. At the time, the Team Snatch onion site only offered access to the CityComp breach (shown below):

Expanding to new targets

By and large, the Github-style directory listing mirrored their openweb site, https://citycomp[.].de, and on May 1, the group announced a new website layout via social media, including a reference to their movie-inspired namesake:

Following this post, Twitter users noted the listing of additional breaches being hosted alongside the CityComp data:

Indeed, a visit to the group’s onion site confirmed such reports:

Each of the newly listed companies (BMK, KCSA, Tecnicas Hidraulicas, and Myatt Blume & Olson) had directory listing pages similar to CityComp, and—in addition to providing general information about the data breaches—each page also included an rsync link for visitors to download the respective datasets. Going public with these data troves shows a pattern for the group, where if companies do not respond to the demands then they will be listed on their website. The group provides basic instructions on how to download the data, and it requires no payment or special access to download.

The datasets, as listed on the website when clicking “View,” are as follows:

  • BMK
  • Financial and Private Information on all clients
  • Unpacked: 97,065 files in 10,259 folders, over 70 Gb data
  • Packed: 31 files, 45 Gb
  • KCSA
  • Financial and private information on all clients
  • Unpacked: 188,403 files in 22,321 folders, over 244 Gb data
  • Packed: 3 files, 190 Gb
  • Tecnicas Hidraulicas
  • Financial and private information on all clients
  • Unpacked: 13,152 files in 4,148 folders, over 25 Gb data
  • Packed: 6 files, 19 Gb
  • Myatt Blume & Olson
  • Financial and private information on all clients
  • Unpacked: 82,673 files and 9,816 folders, over 107 Gb data
  • Packed: 1 files, 40 Gb

After reviewing the breach data, the team found gigabytes of confidential documents, slide decks, PII (passports and identification cards), database and infrastructure credentials, HR documents, policy documents, invoices and contracts.

Key Information

The ZeroFox Alpha Team obtained the data from the Team Snatch servers to verify their authenticity, alert the affected companies, and share with them their respective datasets. We also contacted the appropriate CERT organizations when victims did not respond to communication via phone calls, email, or social media. Since the data is public, it leaves very little time for companies to respond, especially when the actors are actively marketing the data to their social media followers.

In reviewing the leaked files, the ZeroFox Alpha Team concluded with HIGH confidence that the files are confidential and authentic. We are unsure how they were obtained, but based on the previous CityComp breach and its associated actors, it’s likely that the affected companies declined or did not respond to blackmail or extortion demands.

The associated rsync URLs all lead to the same Tor website run by Team Snatch. Connecting over Tor was trivial and required no special software or credentials to access the data. We have HIGH confidence that the group published this data for anyone to download, and it will continue this TTP as the group collects more confidential data from organizations who refuse to give in to blackmail threats.

The data trove contains multiple 7z compressed files, as listed in Appendix 1.

In reviewing the new datasets, our team found no apparent overlap with the original CityComp Breach file listings hosted on the citycomp[.]de website. However, without access to the full data (it has since been taken down), we are unable to reach this conclusion with absolute certainty. Tweets made by the group to news outlets and affected companies also imply the data breaches are disparate:

Translation:
The #ابتزاز#Citycomp German information technology company, which provides Internet infrastructure to dozens #الشركات, has been infiltrated by hackers with stolen data belonging to some of the world's largest companies.

It can be argued that Team Snatch is implying that these companies were part of CityComp, or that they were hacked alongside other companies in the CityComp breach. ZeroFox has LOW-MEDIUM confidence that the data is part of the original breach due to the specific “call-outs” on the onion site.

On or around May 14 2019, the Team Snatch Twitter account was removed from the Twitter platform and, subsequently, the team took down their onion website and rsync services. However, the website returned on or around May 17, 2019, with Perceptics, a new data breach victim, listed in their inventory:

The directory listing for Perceptics is provided in Appendix 2.

Analysis & TTPs

Based on the CityComp incident, the social media engagements, their public website and the additional breaches, it’s clear that this group is willing to publicize their actions if their demands are not met. What is not clear is if the 5 additional victims refused to give into their blackmail demands which then led to the breach. It is important to note that CityComp is a much bigger and more global company than the other 5, and is arguably the groups Magnum Opus.

The directory-style listing and the directions on their website to download the data show that Team Snatch wants to create a wall of sheep for their victims. This wall of sheep fits their modus operandi - they would rather burn their opportunity down rather than accept that victim organizations will not give into their demands. This website could also be a way to prove how serious they are for future victims, and it may tip companies into playing ball with their demands.

This Billy the Kid style of cybercrime isn’t new, but is becoming more common in the age of social and digital media. The Dark Overlord gained popularity by engaging with the media, keeping an active social media presence, flagrantly posting on multiple “hacker” forums, and maintaining their own wall of sheep via Pastebin, Reddit and Steemit.

We believe Team Snatch will continue publishing data and using its rolodex of logos to threaten companies that they compromise. This tactic drifts from traditional ransomware attacks in two ways. First, the confidential data is exfiltrated from the victim rather than the private key for ransomware. Two, the group could use the victim rolodex as a way to trick potential victims that something was exfiltrated when indeed it was not, much akin to the RDoS (ransom denial of service attacks), and the threat alone could be enough for a company to pay the actors. Overall, security organizations should be aware that their defense in depth strategies should include monitoring of the social and digital realm in order to gain visibility and protect themselves from these types of attacks moving forward.

Appendix 1

Breach Details

Dump 1 contains IT and PII information.

Dump 2 contains client information, receipts, and invoices.

Dump 3 contains database credentials, policy files, scan files, configuration backups, passports, PII, HR files, and Financial Planning/Investment Confidential Documents.

Dump 4 contains audit related files and financial information.

Appendix 2

See ZeroFox in action