Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The RansomHub ransomware group is targeting 210 victims in critical sectors
Global Security

The RansomHub ransomware group is targeting 210 victims in critical sectors

AdminBy AdminSeptember 2, 2024No Comments4 Mins Read
RansomHub Ransomware Group
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


RansomHub ransomware group

Threat actors associated with RansomHub The ransomware group has encrypted and stolen data from at least 210 victims since its inception in February 2024, the US government said.

Victims span a variety of sectors, including water and sanitation, information technology, government services and facilities, health and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation and communications. .

“RansomHub is a Ransomware-as-a-Service variant formerly known as Cyclops and Knight that has proven to be an efficient and successful service model (recently attracting high-profile affiliates from other prominent variants such as LockBit and ALPHV).” government institutions said.

A Ransomware-as-a-Service (RaaS) variant that is the offspring of Cyclops and Knight, the cybercrime operation has attracted high-profile affiliates from other prominent variants such as LockBit and ALPHV (aka BlackCat) following a recent wave of law enforcement actions.

An analysis by ZeroFox published late last month noted that RansomHub activity as a share of all ransomware activity observed by the cybersecurity vendor is increasing, accounting for approximately 2% of all attacks in Q1 2024, 5.1% in Q2, and 14.2% % so far in Q3.

Cyber ​​security

“Approximately 34% of RansomHub’s attacks targeted organizations in Europe, compared to 25% of global threats,” the company said in a statement. noted.

The group is known to use a double extortion model to steal data and encrypt systems in order to extort victims who are prompted to contact operators via a unique .onion URL. Targeted companies that refuse to agree to a ransom demand post their information on the data breach site for between three and 90 days.

Initial access to the victim’s environment is facilitated by exploiting known security vulnerabilities in Apache ActiveMQ (CVE-2023-46604), Atlassian Confluence data center and server (CVE-2023-22515), Citrix ADC (CVE-2023-3519), F5 BIG-IP (CVE-2023-46747), Fortinet FortiOS (CVE-2023-27997), and Fortinet FortiClientEMS (CVE-2023-48788) devices, among others.

After this step, affiliates perform reconnaissance and network scanning using programs such as AngryIPScanner, Nmap, and other LOS (LotL) techniques. RansomHub attacks also involve disarming with antivirus software custom tools fly under the radar.

“After initial access, RansomHub affiliates created user accounts for retention, re-enabled disabled accounts, and used Mimikatz on Windows systems to harvest credentials (T1003) and elevate privileges to SYSTEM,” the US government advisory said.

“The branches then moved inside the network using methods including Remote Desktop Protocol (RDP), PsExec, AnyDesk, Connectwise, N-Able, Cobalt Strike, Metasploit, or other widely used Command and Control (C2) methods.”

Another notable aspect of RansomHub attacks is the use of ad hoc encryption to speed up the data theft process using tools such as PuTTY, Amazon AWS S3, HTTP POST requests, WinSCP, Rclone, Cobalt Strike, Metasploit, and other methods.

The development comes after Palo Alto Networks Unit 42 unpacked the tactics associated with the ShinyHunters ransomware, tracked as Bling Libra, highlighting its shift to extorting victims as opposed to their traditional tactics of selling or publishing stolen data. Threat actor was born for the first time in 2020.

“A group obtains legitimate credentials obtained from public repositories to gain initial access to an organization’s Amazon Web Services (AWS) environment,” security researchers Margaret Zimmerman and Chandni Vaya said.

“While the permissions associated with the compromised credentials limited the impact of the breach, Bling Libra penetrated the organization’s AWS environment and conducted reconnaissance operations. The threat team used tools such as the Amazon Simple Storage Service (S3) browser and WinSCP to gather information. in S3 bucket configurations, accessing S3 objects and deleting data.”

Cyber ​​security

It’s also the result of a significant evolution in ransomware attacks, which have gone beyond file encryption and employ sophisticated, multifaceted extortion strategies, even using triple and quadruple ransomware schemes, according to SOCRadar.

“Triple ransomware raises the stakes by threatening additional means of disruption beyond encryption and exfiltration,” the company said said.

“This may include launching a DDoS attack against the victim’s systems or issuing direct threats to the victim’s customers, suppliers, or other partners in order to cause additional operational and reputational damage to those ultimately targeted in the extortion scheme.”

Quadruple extortion ups the ante by contacting and extorting third parties who do business with victims, or by threatening victims to disclose third party data in order to further pressure the victim to pay.

The lucrative nature of RaaS models has caused a surge in new ransomware variants such as Alarich, Kronos, CyberVolk, The data is black, DeathGrip, Hawk eyeand Insam. It also led to Iranian national statesmen cooperate with famous groups like NoEscape, RansomHouse and BlackCat in exchange for a reduction in illegal income.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.