SYMBOLCOMMON_NAMEaka. SYNONYMS

GOLD GARDEN  (Back to overview)


GOLD GARDEN was a financially motivated cybercriminal threat group that authored and operated the GandCrab ransomware from January 2018 through May 2019. GandCrab was operated as a ransomware-as-a-service operation whereby numerous affiliates distributed the malware and split ransom payments with the core operators. GOLD GARDEN maintained exclusive control of the development of GandCrab and associated command and control (C2) infrastructure. Individual affiliates, of which there were frequently more than a dozen in operation simultaneously, coordinated the distribution of GandCrab through spam emails, web exploit kits, pay-per-install botnets, and scan-and-exploit style attacks. On May 31, 2019 the operators announced they have halted operations with no intent to resume for unknown reasons. In April 2019 the operators of GOLD GARDEN transferred the source code of GandCrab to GOLD SOUTHFIELD who used it as the foundation of the REvil ransomware operation. GOLD SOUTHFIELD operates a similar affiliate program comprised largely of former GandCrab users and other groups recruited from underground forums.


Associated Families

There are currently no families associated with this actor.


References
2021SecureworksSecureWorks
@online{secureworks:2021:threat:1d0df39, author = {SecureWorks}, title = {{Threat Profile: GOLD GARDEN}}, date = {2021}, organization = {Secureworks}, url = {http://www.secureworks.com/research/threat-profiles/gold-garden}, language = {English}, urldate = {2021-05-31} } Threat Profile: GOLD GARDEN
Gandcrab GOLD GARDEN

Credits: MISP Project