9542922678?profile=RESIZE_400xRansomware-as-a-Service Operations Seek Affiliates for Extorting New Victims.  After a number of high-profile hits during 2021, some of the largest and most notorious ransomware operations disappeared. Beginning in May 2021, ransomware attacks by Russian-language groups Conti against Ireland's health service, DarkSide against U.S.-based Colonial Pipeline, and REvil against meat processing giant JBS and remote management software firm Kaseya led the Biden administration to try to better disrupt the ransomware business model.

Soon DarkSide and REvil disappeared, as did Avaddon, with experts saying they may have been concerned with new efforts to punish the actors. All were ransomware-as-a-service operations, in which operators develop crypto-locking ransomware and provide it to affiliates as self-employed contractors who infect victims. Whenever a victim pays, the affiliate and operator share a prearranged split of the payoff.  Other services such as collection and call center are available as add-on services too.

Security firm Recorded Future's new site, The Record, recently reported that a disgruntled Conti affiliate leaked manuals and technical guides used to train affiliates, arguing that he'd been getting underpaid.

See:  https://redskyalliance.org/xindustry/conti-actor-leaks-internal-documents

Given the massive profit-making potential ransomware still offers, aided by many organizations being under-defended, many security experts believe that the core operators behind Avaddon, DarkSide and REvil will simply set up shop under a different name. Affiliates, meanwhile, often work with multiple ransomware operations, sometimes simultaneously. While some groups may appear to come and go, the ransomware business model surges on.

Investigators report that new ransomware gangs regularly debut. In recent weeks, law enforcement officials and information security experts have been tracking a surge in activity from lesser-known players, including the emergence of new or renamed operations. All use double extortion, meaning they claim to steal data before crypto-locking systems, and threaten to leak the stolen data to a data-leak site unless victims pay.

Summaries on seven ransomware operations: 

1. ALTDOS

 

In August 2021, Singapore's Cyber Security Agency, police force and Personal Data Protection Commission warned that the ALTDOS cybercrime operation, since appearing last December, has continued to target organizations in Bangladesh, Singapore and Thailand.

"It is currently unknown which ransomware variant is employed by ALTDOS," according to their joint advisory on ALTDOS. "ALTDOS will … contact the victim using an email address hosted on ProtonMail demanding that payment be made or the exfiltrated data will be published."

The advisory adds: "If the victim does not respond or comply to the ransom demand within the given time frame, ALTDOS may also launch a distributed denial-of-service attack on the victim's internet-facing systems to disrupt operational services and to remind them to pay the ransom."

As with the aforementioned ransom groups, ALTDOS practices double extortion, meaning it shakes down victims to pay a ransom not just for a promise that they'll receive in turn a decryption tool, but also for a promise that data stolen by attackers - before they crypto-locked systems - will get deleted. The advisory notes that the group sometimes demands separate ransom payments for a decryptor, versus a promise to delete stolen data.

2. AvosLocker

 

This operation was first spotted in June 2021, with researchers saying it appeared to be focusing on smaller law firms, as well as freight, logistics and real estate firms, in the U.S., the U.K. and parts of Europe. But by the end of last month, the small operation appeared to still be trying to recruit more affiliates, for example, via spam advertisements distributed via Jabber and Telegraph.

"I am not sure there has been much uptake there," Allan Liska, an intelligence analyst with Recorded Future's computer security incident response team, said at the time. "They are definitely worth continuing to monitor."

In late August 2021, AvosLocker's Tor-based data-leak site listed 11 victims, including Moorfields Eye Hospitals UAE, which is a branch of the British National Health Service's Moorfields Eye Hospital Foundation Trust, from which the group says it stole more than 60GB of data. Moorfields has confirmed the attack, though not attributed it.

"Like many of its competitors, AvosLocker offers technical support to help victims recover after they've been attacked with encryption software that the group claims is 'fail-proof,' has low detection rates and is capable of handling large files," say Doel Santos and Ruchna Nigam of Palo Alto's Unit 42 threat research group in a blog post. "We have observed initial ransom demands ranging from $50,000 to $75,000."

3. Hive Ransomware

 

Experts say newcomer Hive ransomware, first spotted on 26 June 2021 by the self-described South Korea-based "ransomware hunter" behind the @fbgwls245 Twitter account, who spotted the group's malicious executable after it was uploaded to the VirusTotal malware-scanning service.

On Thursday, Hive's data-leak site listed 34 victims. "Hive uses all tools available in the extortion toolset to create pressure on the victim, including the date of initial compromise, countdown, the date the leak was actually disclosed on their site, and even the option to share the disclosed leak on social media," Palo Alto's Santos and Nigam say.

While the group may have already honed its shakedown tactics, however, the research and intelligence team at BlackBerry recently said that, based on observed samples of Hive, the malware appears to be very much "still under development."

Criticizing the poor quality of the code, Brett Callow, a threat analyst at security firm Emsisoft, has reported that that samples of Hive seen so far were using "an idiotic and amateurish cryptographic scheme in which 100 RSA keys of varying bit size are used to encrypt files," which promised to complicate recovery.

4. HelloKitty

 

Attacks involving HelloKitty ransomware were first spotted in early 2020. In April 2021, FireEye warned that attackers wielding HelloKitty had been targeting unpatched SonicWall SMA 100 Series unified access gateways. A zero-day flaw in the devices, designated CVE-2021-20016, was confirmed by the vendor on 23 January 2021 and patched in February 2021.

In July 2021, the Palo Alto researchers say they spotted "a Linux variant of HelloKitty targeting VMware's ESXi hypervisor, which is widely used in cloud and on-premises data centers." The ESXi hypervisor likely was being targeted because of the large ransoms that could be demanded if attackers successfully crypto-locked these systems. Palo Alto says that HelloKitty-wielding attackers have demanded ransoms of up to $10 million, but they recently received a trio of large ransoms that added up to just $1.5 million.

5. LockBit 2.0

 

Formerly known as ABCD ransomware, LockBit has been active since September 2019, but it recently debuted ransomware that the operation has dubbed LockBit 2.0. Recent victims have included consultancy Accenture.

"LockBit 2.0 prides itself on having one of the fastest and most efficient encryption methods in today's ransomware threat landscape," security firm Trend Micro said in a recent report.

In an apparent bid to increase the group's profile and attract new affiliates, a spokesman for the group, who goes by "LockBitSupp," recently granted an interview to the Russian OSINT YouTube channel, extoling the virtues of his operation program, which he says remits 80% of every ransom paid to the responsible affiliate. LockBitSupp also said operators continues to refine the malware and other tools in an attempt to make attacks not just faster but more automated, including for exfiltrating data and routing it to a dedicated data-leak site.

As of the end of August 2021, the LockBit 2.0 leak site listed 64 victims, some of which had their stolen information already published, and others for which a countdown timer is still running.

6. OnePercent Group

 

The FBI recently released a flash alert on the OnePercent Group, which warns that it has been active since November 2020 and uses phishing attacks to infect victims with the IcedID aka BokBot a banking Trojan. The phishing emails arrive with zip files containing a Microsoft Word or Excel document that has a malicious macro designed to install the malware, which drops and executes the Cobalt Strike penetration-testing tool.

Together with PowerShell scripting, the attackers move laterally across the network, using the Rclone tool to exfiltrate data to cloud storage before ultimately deploying their crypto-locking malware on every possible, the FBI stated.

"The actors have been observed within the victim's network for approximately one month prior to deployment of the ransomware," the FBI reports.

After that, "the victim will start to receive phone calls through spoofed phone numbers with ransom demands and are provided a ProtonMail email address for further communication," the FBI says. "The actors will persistently demand to speak with a victim company's designated negotiator or otherwise threaten to publish the stolen data."

For any victims who refuse to pay, the group has previously threatened to sell the stolen data to the REvil, aka Sodinokibi group, it says.

Email security firm Armorblox notes that the indicators of compromise described by the FBI overlap with activity ascribed to the "Shathak" or "TA551" groups, which Mandiant designates UNC2420, as well as an analysis of the IcedID infrastructure detailed in May 2021 by security firm Team Cymru.

  1. BlackMatter Ransomware

 

In late July 2021, a cybercrime forum user with the handle "BlackMatter" announced the launch a new operation that "incorporated in itself the best features of DarkSide, REvil and LockBit."

After analyzing a BlackMatter decryptor found in the wild, however, ransomware-hunting expert Fabian Wosar, CTO of security firm Emsisoft, announced: "I am convinced that we are dealing with a DarkSide rebrand here." Blockchain analysis firm Chainalysis has analyzed the cryptocurrency wallets being used by BlackMatter, leading it to also conclude that it's a rebrand of DarkSide.

Thus, predictions that ransomware operators would simply set up shop under a different name appear to have come to pass. "We have known for years that hacking is an addictive behavior," says information security veteran William Hugh Murray. "It is naive to expect reform. 'Rebranding' is much more likely than reform or retirement."

The following is what Red Sky Alliance recommends:

  • All data in transmission and at rest should be encrypted.
  • Proper data back-up and off-site storage policies should be adopted and followed.
  • Implement 2-Factor authentication-company wide.
  • For USA readers, join and become active in your local Infragard chapter, there is no charge for membership. infragard.org
  • Update disaster recovery plans and emergency procedures with cyber threat recovery procedures. And test them.
  • Institute cyber threat and phishing training for all employees, with testing and updating.
  • Recommend/require cyber security software, services and devices to be used by all at home working employees and consultants.
  • Review and update your cyber threat and information security policies and procedures. Make them a part of all emergency planning and training.
  • Ensure that all software updates and patches are installed immediately.
  • Enroll your company/organization in RedXray for daily cyber threat notifications are directed at your domains. RedXray service is $500 a month and provides threat intelligence on nine (9) cyber threat categories including Keyloggers, with having to connect to your network.
  • Purchase annual cyber insurance coverage from Red Sky Alliance provided by Cysurance.


Red Sky Alliance is a Cyber Threat  Analysis  and  Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@wapacklabs.com 


Weekly Cyber Intelligence Briefings:

Reporting:   https://www.redskyalliance.org/
Website:     https://www.wapacklabs.com/
LinkedIn:    https://www.linkedin.com/company/64265941


Weekly Cyber Intelligence Briefings:


REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/3702558539639477516

 

TR-21-250-001.pdf

 

https://www.bankinfosecurity.com/7-emerging-ransomware-groups-practicing-double-extortion-a-17384?rf=2021-08-27_ENEWS_SUB_BIS__Slot6_ART17384&mkt_tok=MDUxLVpYSS0yMzcAAAF_JwwvVMl4Cx7B85J4dyUCjhBvAtbxjH9VzJAz7fa-SHh2EHClkHQ7mF1-wHlyEpD2CyTeNYxqfpEIvxQJ06ZimxmpVnsCXEWt_t5fZW0qnOTbTEk

 

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!

Join Red Sky Alliance