Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AI Agent may be leaking data – Watch this webinar and learn how to stop it

Unlocking Space for Business with satellite solutions

Promotes European space weather monitoring capabilities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Ransomhub will become the top ransomware group in 2024, launching over 600 organizations worldwide
Identity

Ransomhub will become the top ransomware group in 2024, launching over 600 organizations worldwide

userBy userFebruary 14, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ransom Hub

Threat actors behind the Ransomhub Ransomware-as-a-Service (RAAS) scheme leverage security flaws currently patched with Microsoft Active Directory and Netlogon protocols to escalate privileges and turn to domain controllers in victim networks It has been observed that it is utilizing the Netlogon protocol to gain unauthorized access. Their post-compromise strategy.

“Ransomhub targets over 600 organizations across sectors such as healthcare, finance, government and critical infrastructure, and established it firmly in 2024 as the most active ransomware group,” said Group. -IB analysts said in a thorough report released this week.

The ransomware group first appeared in February 2024 and has accelerated its operation by obtaining source code related to the now-deprecated Knight (formerly Cyclops) Larsgang of the Lamp Cyber ​​Crime Forum. About five months later, an illegal market updated locker was advertised, with the ability to remotely encrypt data via the SFTP protocol.

It comes with multiple variants that allow you to encrypt files on Windows, VMware ESXI, and SFTP servers. Ransomhub has also been observed to actively recruit affiliates from Lockbit and Blackcat groups as part of its partnership program, indicating its attempts to leverage law enforcement measures targeting rivals.

Cybersecurity

In an incident analyzed by a Singaporean cybersecurity company, threat actors use publicly available proof of concept (POC) to influence Palo Alto Networks PAN-OS devices (CVE-2024-3400) It is said that they tried to take advantage of a serious flaw. ), before eventually violating the victim network by brute force attacks on the VPN service.

“This brute force attempt was based on a concentrated dictionary of over 5,000 usernames and passwords,” the researchers said. “The attacker ultimately gained access through the default accounts that are frequently used in data backup solutions, and ultimately the perimeter was compromised.”

The initial access was then abused, carrying out a ransomware attack, and data encryption and delamination occurred within 24 hours of compromise.

In particular, it includes weaponization of two known security flaws in Active Directory (CVE-2021-42278 aka NOPAC) and Netlogon protocol (CVE-2020-1472 aka Zerologon), grabs control of domain controllers and laterals across the network. Moved directionally. .

“The exploitation of the above vulnerabilities allowed the attacker to gain full privileged access to the domain controller, a neural center of Microsoft’s window-based infrastructure,” the researchers said. .

“After the removal operation was completed, the attacker prepared the environment for the final stage of the attack. The attacker manipulated it to provide all the corporate data, stored in various NASs and was completely unreadable. The purpose of enforcing victims to pay ransom is to retrieve the data, which is inaccessible, prevented from being restored.”

Another notable aspect of the attack is the use of pchunter to stop and bypass the endpoint security solution, and filezilla for data removal.

“The origins of the Ransomhub group, its attack operations and overlapping characteristics with other groups confirm the existence of a vivid cybercrime ecosystem,” the researchers said.

“This environment thriving in the sharing, reuse and rebranding of tools and source code, promoting a robust underground market where famous victims, infamous groups and substantial amounts play a central role. Masu.”

Cybersecurity companies detail the internal mechanisms of the “formal RAAS operator,” known as Lynx, highlighting affiliate workflows, cross-platform ransomware arsenals for Windows, Linux and ESXI environments, and customizable encryption modes. It was developed to hit.

Analysis of Windows and Linux versions of ransomware shows it is very similar to Inc ransomware, indicating that it is likely that the threat actor has obtained the source code for the latter.

“Affiliates are incentivized with an 80% share of ransom revenue, reflecting a competitive, recruitment-driven strategy,” he said. “Lately, Lynx has added multiple encryption modes: “Fast”, “Medium”, “Slow”, and “Overall” give the freedom to adjust the trade-off between speed and depth of file encryption. Give it to affiliate marketing. ”

“The group’s recruitment post at the underground forum highlights the rigorous verification process of pentesters and skilled intrusion teams, highlighting Lynx’s emphasis on operational security and quality control. Results . “

Top Ransomware

In recent weeks, financially motivated attacks have also been observed using Phorpiex (aka Trik) botnet malware propagated via phishing emails to deliver lock bit ransomware .

“Unlike previous Lockbit Ransomware Icidents, threat actors rely on Phorpiex to provide and run Lockbit Ransomware,” Cybereason said in the analysis. “This technique is unique because ransomware deployments are usually made up of human operators carrying out the attack.”

Another important initial infection vector concerns the use of unpaid VPN appliances (e.g. CVE-2021-20038) to access internal network devices and hosts and ultimately deploy Abyss locker ransomware.

Cybersecurity

Attacks are also characterized by using tunnel tools to maintain persistence and by leveraging proprietary Vulnerable Driver (BYOVD) techniques to disable endpoint protection controls.

“After gaining access to the environment and performing reconnaissance, these tunnel tools will be strategically deployed to critical network devices such as ESXI hosts, Windows hosts, VPN appliances, and network attached storage (NAS) devices. ” says Sygnia researchers.

Top Ransomware

“By targeting these devices, attackers ensure robust and trustworthy communication channels to maintain access across the compromised network and coordinate malicious activity.”

The ransomware landscape, led by old and new threat actors, continues to maintain attacks where attacks pivot from traditional encryption to data theft and fear tor. .

“Groups like Ransomhub and Akira encourage stolen data with great rewards and put these tactics incredibly advantageous,” said cybersecurity company Huntress.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAt least 10 people were killed by bomb blasts in Balochistan, Pakistan | News of armed groups
Next Article Russia-related hackers hijacking accounts using “device code phishing”
user
  • Website

Related Posts

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025

Google has ordered to pay $314 million by misusing cellular data for Android users without permission

July 4, 2025

Large Android scam business has been revealed: Iconads, KaleIdoscope, SMS Malware, NFC Scams Identified apps are designed to load out-of-context ads on users’ screens and hide icons from the device’s home screen launcher, making it difficult for victims to remove them according to the company’s Satori Threat Intelligence and Research team. The app was then removed from the Play Store by Google. Advertising fraud schemes accounted for 1.2 billion bid requests per day due to their high activity. The majority of Iconads-related traffic comes from Brazil, Mexico and the United States. Iconads is a variant of the threat tracked by other cybersecurity vendors under the name Hiddedads and Vapor, and since at least 2019, malicious apps have been sliding around the Google Play Store repeatedly. Some of the common features of these apps include the use of obfuscation for concealment…

July 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI Agent may be leaking data – Watch this webinar and learn how to stop it

Unlocking Space for Business with satellite solutions

Promotes European space weather monitoring capabilities

Google has ordered to pay $314 million by misusing cellular data for Android users without permission

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.