Comprehensive Ransomware Detection for UK Public Healthcare

Comprehensive Ransomware Detection for UK Public Healthcare

Keypoints

  • Qilin (Agenda) attacked Synnovis in June 2024, leaking ~400 GB and data on ~900,000 patients after a failed ransom demand and causing severe clinical disruption.
  • Common initial access vectors across groups include phishing, exposed RDP/Citrix/VPN gateways, exploiting known vulnerabilities (e.g., CVE-2023-3519, Log4Shell), and purchased/stolen credentials.
  • Credential theft techniques (LSASS dumps via ProcDump, Mimikatz, memory scraping) and Cobalt Strike are repeatedly used for persistence, privilege escalation, and lateral movement.
  • Adversaries often perform defense-evasion (clearing event logs, disabling Windows Defender, deleting Volume Shadow Copies) prior to encryption or data exfiltration.
  • Some groups (RansomHouse) focus on pure data theft and extortion without encryption, using tools like 7-Zip and rclone to prepare and exfiltrate archives to cloud services.
  • Logpoint provides specific alert rules mapped to MITRE techniques to detect stages like credential access, lateral movement, defense evasion, exfiltration, and high-volume file modification.
  • Recommended defensive measures for UK healthcare include prioritizing critical systems, tuned alert thresholds, layered detection (network, endpoint, logs, UEBA), MFA/JIT access, segmentation, immutable backups, and continuous staff training.

MITRE Techniques

  • [T1078] Valid Accounts – Used via stolen or purchased credentials and RDP/VPN access: ‘stealing or purchasing valid credentials (acting as an initial access broker)’.
  • [T1566] Phishing – Phishing emails are frequently used for initial access: ‘phishing emails carrying malware’ and ‘phishing, malicious email attachments’.
  • [T1210] Exploitation of Remote Services – Exploiting exposed services and CVEs (e.g., Citrix ADC CVE-2023-3519, Log4Shell) to gain initial access: ‘exploiting a Citrix ADC VPN flaw CVE-2023-3519’ and ‘exploit unpatched vulnerabilities (such as the Log4j “Log4Shell” flaw)’.
  • [T1055] Process Injection / Process Hollowing – Used to evade defenses and run malicious code in legitimate processes: ‘Process Hollowing Detected’ and ‘Identifies code injection into legitimate processes’.
  • [T1003] OS Credential Dumping – Memory scraping of LSASS using Mimikatz or ProcDump to harvest credentials: ‘dumping LSASS memory, or using tools like Mimikatz or ProcDump to grab user passwords’.
  • [T1021] Remote Services (PsExec, RDP, SMB) – Lateral movement using PsExec, RDP, SMB or remote admin tools: ‘move laterally via PsExec, RDP or even remote tools like AnyDesk and TightVNC’.
  • [T1071] Application Layer Protocol (C2 with Cobalt Strike) – Use of Cobalt Strike beacons for command-and-control and persistence: ‘use tools like Cobalt Strike beacons for persistence’.
  • [T1490] Inhibit System Recovery (Shadow Copy Deletion) – Deleting Volume Shadow Copies to prevent recovery: ‘deleting Volume Shadow Copies to inhibit backups’ and ‘Shadow Copy Deletion Using OS Utilities Detected’.
  • [T1112] Modify Registry (Disable Security Tools) – Disabling Windows Defender via registry or other means to evade detection: ‘Windows Defender Antivirus Disable Detected’ and ‘Suspicious Windows Defender Registry Keys Modification’.
  • [T1070] Indicator Removal on Host (Event Log Clearing) – Clearing event logs to remove forensic evidence: ‘Eventlog Cleared Detected’ and ‘Triggers on actions like wevtutil used to wipe forensic logs’.
  • [T1041] Exfiltration Over C2 Channel / Cloud Storage – Exfiltration to cloud services (Mega, Dropbox) or using rclone: ‘Exfiltration over Cloud Application Detected’ and ‘RClone Utility Execution’.
  • [T1486] Data Encrypted for Impact – Ransomware encryption campaigns producing high volumes of file modifications: ‘High Volume of File Modification or Deletion in a Short Span’ and references to AES/ChaCha20/AES+RSA-4096 usage.
  • [T1098] Account Manipulation (Scheduled Tasks / Admin Account Creation) – Creation of scheduled tasks or admin accounts for persistence: ‘Scheduled Task Creation Detected’ and ‘Suspicious Admin Account Creation Detected’.

Indicators of Compromise

  • [File Names / Tools] Credential theft and exfiltration tools – examples: Mimikatz, ProcDump, rclone, and 7-Zip (used to compress data for exfiltration).
  • [Domains / Cloud Services] Cloud storage exfiltration destinations – examples: Mega, Dropbox (noted as targets for uploaded exfiltrated data).
  • [Vulnerabilities / CVEs] Exploited vulnerabilities – example: CVE-2023-3519 (Citrix ADC), and Log4Shell (Log4j) exploitation noted.
  • [Behavioral IOCs] High-volume file modification and shadow copy deletion – context: observed prior to encryption; ’30 file modifications or deletions within 1 minute’ and vssadmin/wmic shadow copy deletion activity.
  • [Events / Logs] Event log clearing and Defender tampering – context: attackers clear Windows event logs (Event ID 1102/104 referenced) and disable or modify Windows Defender settings/registry keys.


Read more: https://logpoint.com/en/blog/comprehensive-ransomware-detection-for-uk-public-healthcare