On August 29, 2024, a joint advisory was issued by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human Services (HHS).
This advisory shed light on RansomHub ransomware, a formidable new threat in the cyber landscape.
As part of the #StopRansomware initiative, this update aims to arm network defenders with crucial information on RansomHub’s tactics, techniques, and procedures (TTPs), as well as indicators of compromise (IOCs). The Traffic Light Protocol (TLP) of CLEAR indicates that this information is intended for open dissemination to bolster collective defenses against ransomware.
RansomHub, also identified as Cyclops and Knight, emerged in February 2024 and has rapidly become a significant player in the ransomware arena. It has targeted a broad spectrum of sectors, including critical infrastructure such as water treatment, healthcare, and government services.
Notably, RansomHub employs a double-extortion model, encrypting data and then exfiltrating it to demand ransom payments. Victims are pressured not only to pay the ransom to regain access to their encrypted data but also to avoid having their stolen information published online.
According to Cyble’s vision report, RansomHub appears to be an evolution of the Knight ransomware group, with ties to ALPHV affiliates and a distinctive Ransomware-as-a-Service (RaaS) model. This model includes a prepayment scheme, adding a layer of complexity to the attack process.
The ransomware exploits known vulnerabilities like Zerologon for initial access, further underscoring its sophisticated nature. The group’s operations reveal a preference for utilizing advanced techniques, including zero-day vulnerabilities and sophisticated data exfiltration methods.
RansomHub has shown a wide-ranging impact, affecting industries from aerospace and defense to agriculture, automotive, and healthcare. Its global reach is evident in the diverse list of targeted countries and sectors, illustrating the ransomware’s indiscriminate nature and extensive impact.
RansomHub affiliates gain access through a range of methods, such as phishing, which involves sending out mass or spear-phishing emails, and the exploitation of vulnerabilities like CVE-2023-3519 and CVE-2023-27997. They also use password spraying to attempt entry through weak or compromised credentials.
Once inside, the group utilizes tools like AngryIPScanner and Nmap to scan and map networks, identifying potential targets for lateral movement. To evade detection, RansomHub employs several techniques, including renaming ransomware executables to benign names, clearing system logs to obstruct forensic analysis, and disabling security tools using methods such as Windows Management Instrumentation (WMI).
For privilege escalation and lateral movement, they harvest credentials with tools like Mimikatz and use RDP, PsExec, and command-and-control tools to navigate within the network. Data exfiltration is achieved through various methods, including the use of cloud storage services like AWS S3 buckets and HTTP POST requests to transfer data.
RansomHub secures files through Curve 25519 elliptic curve encryption, encrypting data in chunks and appending metadata with encryption keys. They leverage both legitimate and repurposed tools, such as Cobalt Strike for lateral movement and file execution, PowerShell for scripting and automation, and WinSCP and RClone for file transfers and syncing with cloud storage. The advisory also lists Indicators of Compromise (IOCs) associated with RansomHub, including specific file paths, IP addresses, and URLs related to the ransomware’s operations.
The RansomHub ransomware represents a complicated threat to organizations across various sectors. Its sophisticated techniques and extensive reach necessitate a proactive and comprehensive approach to cybersecurity.
By implementing the recommended mitigations and staying informed about evolving threats, organizations can better protect themselves against ransomware attacks. For additional resources and guidance on ransomware defense, organizations are encouraged to visit stopransomware.gov and engage with relevant cybersecurity communities.
Sources: https://www.ic3.gov/Media/News/2024/240829.pdf