back to article Nitrogen ransomware is so broken even the crooks can't unlock your files

Cybersecurity experts usually advise victims against paying ransomware crooks, but that advice goes double for those who have been targeted by the Nitrogen group. There's no way to get your data back from them! According to Coveware, which peered under the hood of Nitrogen's ransomware program, a programming error prevents the …

  1. VicMortimer Silver badge

    Criminalize paying ransom

    It should be a crime to pay ransom anyway.

    The ONLY way ransomware is going to stop is if a few CEOs go to jail for paying.

    1. elsergiovolador Silver badge

      Re: Criminalize paying ransom

      Reminds me of one outfit where security would do things like drop a thumb drive in the office that would lock employee's device if plugged in with a notice they got fired.

      Seems like nobody is doing these things any more.

      1. Anonymous Coward
        Anonymous Coward

        Re: Criminalize paying ransom

        I sometimes work for a .GOV.UK outfit and we did a similar thing. 'Managment' got caught so many times we now lock usb ports physically and electronically - saves face.. sigh..

        1. Stuart Castle

          Re: Criminalize paying ransom

          My employer couldn’t do anything like that. Initially because during Covid, we gave staff usb headsets and laptops so they could work from home, but now because we’ve switched a policy of giving out laptops and docking stations in preference to desktops. You have to have a pretty bulletproof business case to get a desktop now. Most docks require usb connections now.

          1. Oneman2Many Bronze badge

            Re: Criminalize paying ransom

            You can stop USB file access while still allowing other USB devices such as headsets, keyboard/mouse and docks to work fairly easily with group policy.

    2. druck Silver badge

      Re: Criminalize paying ransom

      The only way to stop it is to outlaw the only method of payment which makes it viable - crypto curremcies.

      1. Eric 9001

        Re: Criminalize paying ransom

        Other methods of payment can be viable, like gift cards - cryptocurrencies are just more convenient.

        Outlawing cryptocurrencies can't magically make them stop working - all it could do is force adoption of private ones like Monero (which the government certainly does not want, which is why cryptocurrencies are not banned).

    3. powershift

      Re: Criminalize paying ransom

      Easy for you to say. Those CEO's may care about their employees, families, women and children dependent on the company for their survival.

      1. Alan_Peery

        Re: Criminalize paying ransom

        Those CEOs would then be funding continued destruction, and thus guilty in the next attack.

      2. Danny 14

        Re: Criminalize paying ransom

        if the CEOs care that much, they would pay for immutable backups amd listen to their IT staff.

        1. Uh, Mike

          Re: Criminalize paying ransom

          This is what puzzles me.

          Does ransomware somehow destroy backups stored offline?

          Or are we only hearing about cases where backup hygiene is lax?

          1. Anonymous Coward
            Anonymous Coward

            Re: Criminalize paying ransom

            Most backups aren't offline - it's been years since most systems were writing to a tape drive and someone took the cartridge and locked it in a fire safe each day (hopefully).

            Most backups are online for many reasons, including ease and speed of recovery (and therefore visible to any bad actors who have access to your production network).

            A lot of backup systems are administered at the infrastructure level by the same people with credentials to the production environment (so if credentials are compromised, you get two birds, for the one stone).

            Immutability is often talked about, but if the immutability doesn't continue from the backup software all the way through the data path to the controller running the drives, it can more often than not be circumvented.

      3. Eivind Eklund

        Re: Criminalize paying ransom

        If ot was criminalized, there would be no randomware, so that problem would go away.

      4. Wang Cores Silver badge

        Re: Criminalize paying ransom

        >Easy for you to say. Those CEO's may care about their employees, families, women and children dependent on the company for their survival.

        Have you actually met a CEO? I think a talk with one will be illuminating for you.

    4. Lee D Silver badge

      Re: Criminalize paying ransom

      No need.

      It's literally money laundering anyway.

      You are paying an unknown and unidentified third-party money in order to facilitate them committing a crime.

      There is literally no LEGAL way to do that as a business.

      (For all you know, the director and his secretary got together, they "attacked" the company, the company "paid the ransom", and those two took the proceeds and are now living in Bali....)

      I have to keep explaining this to my (audited, registered charity) employer. You can't ever pay a ransom, because it's money-laundering. It's that simple. We can't even accept a donation over a certain amount unless we can prove who it came from, let alone pay out thousands to random, unidentified people, for illegal purposes.

      1. Random Handle

        Re: Criminalize paying ransom

        It's only illegal if there is a suspicion of terrorist or specifically sanctioned (by Government) groups/individuals - ICO/NCSC etc advise non-payment but allow it and have advised it in at least couple of cases. Money laundering regs covers money which is the proceeds of crime not money paid to criminals (which would effect vast swathes of other industry too!)

        1. Lee D Silver badge

          Re: Criminalize paying ransom

          Now prove that you're not involved in the crime, or benefiting from the proceeds of it, when you pay the "anonymous" attackers...

  2. BartyFartsLast Silver badge

    I doubt that will worry them.

    All they care about is getting the ransom, why would they give a toss if you get your data back or not?

    1. Chloe Cresswell Silver badge

      Re: I doubt that will worry them.

      Because if you know, say, due to this article, that you still won't get your files, why pay?

      1. BartyFartsLast Silver badge

        Re: I doubt that will worry them.

        Agree, but as much as I'd love to think *everyone* who gets hit by ransomware reads el reg, or some other IT publication, that's not the case.

        People will fall for it and pay.

        1. Danny 14

          Re: I doubt that will worry them.

          the insurance companies will know and advise they wont pay.

      2. Random as if ! Bronze badge

        Re: I doubt that will worry them.

        Yeah but, they will say el-reg is lying to stop payment , pay or we shall encrypt your grandma!

        1. Rob
          Mushroom

          Re: I doubt that will worry them.

          So your saying that Trump is the leader fo the gang if the standard line is to decry the journalists as lying.

          1. Roland6 Silver badge

            Re: I doubt that will worry them.

            Are the people behind Nitrogen asking for payment in $Trump ?

    2. Anonymous Coward
      Anonymous Coward

      Re: I doubt that will worry them.

      People are more likely to pay if there is evidence in previous cases that paying results in getting their data back. Security organisations know which groups will release keys and will at least advise if a payment will get data back or not.

      And there are a lot more payments going on then anybody will admit to. I've heard both M&S and JLR paid something.

  3. Eclectic Man Silver badge
    Facepalm

    Quality control?

    According to a retired bomb disposal officer, the IRA had a pretty good build standard for their 'official' explosive devices. Now admittedly the IRA bombing campaign on the UK mainland was mostly to scare rather than kill people, so they wanted the UK authorities to know that their bombs would cause damage if they were not defused in time, but also that they could be defused in time if their warnings were heeded. They also did not want to blow up their own people.

    Criminals using ransomware to obtain funds really do need to check the quality of their code and to test it properly first. I'm not expecting ISO certified quality here, just common sense*.

    *If you are expecting any from this poster, you are going to be seriously disappointed.

    1. Doctor Syntax Silver badge

      Re: Quality control?

      "They also did not want to blow up their own people."

      They did not succeed in this. As I've said before, one of my first jobs in forensic science was cleaning up clothing remnants so that the family of a failed bomber Cound identify them. It involved removing bits of bomber from them. Then there was the Newry customs post bombing at about the same time. The only trace of a 3rd bomber was a penis whose blood group didn't match the other two pools.

  4. zuul

    Regulation

    It's clearly high time this industry was properly regulated. It's like the wild west out there!

    1. Anonymous Coward
      Anonymous Coward

      Re: Oversight, Regulation & Protection ... Not on my watch !!!

      There will be no change until someone wants things to get better and actually starts putting in place the things that would make the current 'Wild West' illegal and not just 'out of favour'.

      Unfortunately, the current POTUS is not pro Oversight, Regulation & Protection, which means that he is not going to support anyone who trys to put in place things that facilitate Oversight, Regulation & Protection in our industry or ANY Industry or Arena of life.

      Herr Trumps view is that Oversight, Regulation & Protection impacts Profits and therefore needs to be reduced NOT increased.

      To date Herr Trump has impacted the existing Oversight, Regulation & Protection by attacking the agencies that were there to provide these things.

      The agencies have been weakened and the people in those agencies have been replaced with cronies that follow his every word.

      NO CEO is going to risk Herr Trumps response to being actively worked against !!!

      TL;DR

      Not going to happen until Hell freezes over ... twice !!!

      :)

    2. Roland6 Silver badge

      Re: Regulation

      Which industry? The ransomware industry?

      Can’t see criminals submitting themselves to regulation…

    3. Doctor Syntax Silver badge

      Re: Regulation

      Some whooshes there.

  5. I am David Jones Silver badge

    Leaving aside the ethical issue of paying ransoms, as it is just 4 bytes that are overwritten isn’t it easily brute-forced?

    1. brainwrong Bronze badge

      No, you still have to search the entire private key space to find the private key corresponding with the incorrect public key. I think it may even be possible that there isn't a corresponding private key.

    2. Eivind Eklund

      This isn't four bytes of the private key - it's four bytes of the public key, which means the associated private key is entirely unknown.

  6. M.V. Lipvig Silver badge

    Did you just...

    help cybercrooks make a better tool for theft by detailing the exact fault for them?

  7. TeeCee Gold badge
    Facepalm

    Nitrogen has been around since 2023

    That probably rules out vibe-coding and puts this one down to good old-fashioned incompetence.

    1. BOFH in Training

      Just cos someone was hand coding stuff 3 years ago, it doesn't mean they haven't switched to vibe coding now for "easy/boring stuff".

  8. nbc

    Here's an idea

    How about finding the criminals and prosecuting them?

    Criminalizing the victim by making it illegal to pay a ransom is insane.

  9. Oh No, Not Again

    Why not consider the obvious, that it's a deliberate ploy?

  10. JamesTGrant Silver badge

    No because it’s the public key that’s mashed. With asymmetrical encryption you can’t decode a payload using the public key which was used to encrypt it.

    The generation of the public key from its private key is easy and not supposed to be hard. But changing even one bit of a public key makes the corresponding private key unusable and if you were to do a bitwise comparison between the original private key and the private key that corresponds to the modified public key then they would be very different.

    Effectively, they don’t have the private key because they corrupted their public key and you cant derive the private key from the public key.

    Hope that helps!!

  11. Pete 2 Silver badge

    Hacked by their own petard

    > it's hard to see the funny side with this one

    Oh, I don't know. What if some enterprising white-hat managed to hold to ransom Nitrogen's own systems with their own un-restorable software

  12. Blue Screen of Bleurgh

    Backup, backup, backup 3-2-1/3-2-1-1-0 and any combination thereon.

    Disaster Recovery testing scenarios

    Proactive over Reactive

    What If ... How To ...

    Not difficult concepts for a CEO to take onboard, but it seems not

    1. Anonymous Coward
      Anonymous Coward

      Just doing backups isn't enough. You don't think M&S or JLR didn't have backups. Firstly ransomware integrates into your backup solutions and will encrypt it but still leave it accessible. Secondly these attacks rarely attack servers directly so just restoring or even rebuilding your serves isn't enough, they will just get re-attacked.

  13. Anonymous Coward
    Anonymous Coward

    Data touched by ransomware is useless

    When I was at Dell a few years ago I was scolded for saying this so let me say it again: data touched by ransomware is absolutely useless. There is no point to "ransoming" your data.

    Anything that can encrypt your data can alter it, so paying for ransomware is paying for data that can have been altered in unknown ways.

    Active software could have had its functionality changed, for example backdoors installed.

    Data at rest could have been altered to represent or say anything. You want to face an audit and explain why every invoice for the past two years reads $69?

    The solution to ransomware is a robust and fully-tested (that is, restored-from-blank-slate) backup and restoration system. And it's got to have enough depth to withstand time-delayed ransomware that infects multiple backups before executing. That way if you're hit with ransomware you restore from backup, take the L, and move ahead.

    You CAN'T use data that has been "encrypted and ransomed." It's garbage.

    My nitwit masters at Dell were focused on "solving the ransomware problem" by purchasing some expensive suite of vaporware that would magically assure them they would not be victims of a ransomware attack. Every VP wanted to be the one who dropped eight figures but made so that the company could unclench its collective butthole.

    What they didn't want to be told was you already have the software - it's your backup system. If you don't already have a reliable, robust backup system, now's the time to ensure that you do. And remember, unless you've restored cold, blank systems from backup to full operation, you don't yet know whether your backup system works.

    While you're at it, work on your disaster recovery plan and emergency communications structure. And remind employees not to talk to the press about anything that happens. Leave that to corporate communications or risk damaging your company's stock price with rumor and supposition.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon