“CosmicBeetle Advances: RansomHub’s Probation Period”

CosmicBeetle is documented by ESET as deploying its ScRansom ransomware and impersonating established gangs like LockBit and RansomHub, underscoring an affiliate-style approach and evolving toolset. The operation targets SMBs globally with ongoing development and notable encryption flaws that can render some data unrecoverable. #CosmicBeetle #ScRansom #LockBit #LockBit3.0 #RansomHub #Spacecolon

Keypoints

  • Active Deployment: CosmicBeetle is actively distributing its custom ransomware, ScRansom, in 2024.
  • Ransomware Analysis: ScRansom has significant flaws, making some encrypted files irrecoverable.
  • LockBit Impersonation: The group has been using the leaked LockBit builder and impersonating LockBit in ransom notes.
  • RansomHub Connection: CosmicBeetle may be a new affiliate of the RansomHub ransomware gang.
  • Exploitation of Vulnerabilities: The threat actor exploits long-standing vulnerabilities to breach SMBs worldwide.

MITRE Techniques

  • [T1595.002] Active Scanning: Vulnerability Scanning – CosmicBeetle scans its targets for a list of vulnerabilities it can exploit. “CosmicBeetle scans its targets for a list of vulnerabilities it can exploit.”
  • [T1590.005] Gather Victim Network Information: IP Addresses – CosmicBeetle scans the internet for IP addresses vulnerable to the vulnerabilities it can exploit. “CosmicBeetle scans the internet for IP addresses vulnerable to the vulnerabilities it can exploit.”
  • [T1583.001] Acquire Infrastructure: Domains – CosmicBeetle registered its own leak site domain. “CosmicBeetle registered its own leak site domain.”
  • [T1587.001] Develop Capabilities: Malware – CosmicBeetle develops its custom toolset, Spacecolon. “CosmicBeetle develops its custom toolset, Spacecolon.”
  • [T1588.002] Obtain Capabilities: Tool – CosmicBeetle utilizes a large variety of third-party tools and scripts. “CosmicBeetle utilizes a large variety of third-party tools and scripts.”
  • [T1588.005] Obtain Capabilities: Exploits – CosmicBeetle utilizes publicly available PoCs for known exploits. “CosmicBeetle utilizes publicly available PoCs for known exploits.”
  • [T1588.001] Obtain Capabilities: Malware – CosmicBeetle probably obtained ransomware from RansomHub and the leaked LockBit 3.0 builder. “CosmicBeetle probably obtained ransomware from RansomHub and the leaked LockBit 3.0 builder.”
  • [T1190] Exploit Public-Facing Application – CosmicBeetle gains initial access by exploiting vulnerabilities in FortiOS SSL-VPN and other public-facing applications. “CosmicBeetle gains initial access by exploiting vulnerabilities in FortiOS SSL-VPN and other public-facing applications.”
  • [T1204] User Execution – CosmicBeetle relies on user execution for some of its tools, though this is usually done by the threat actor via RDP. “CosmicBeetle relies on user execution for some of its tools, though this is usually done by the threat actor via RDP.”
  • [T1059.003] Command and Scripting Interpreter: Windows Command Shell – CosmicBeetle executes various BAT scripts and commands. “CosmicBeetle executes various BAT scripts and commands.”
  • [T1059.001] Command and Scripting Interpreter: PowerShell – CosmicBeetle executes various PowerShell scripts and commands. “CosmicBeetle executes various PowerShell scripts and commands.”
  • [T1136.001] Create Account: Local Account – CosmicBeetle often creates an attacker-controlled administrator account. “CosmicBeetle often creates an attacker-controlled administrator account.”
  • [T1078] Valid Accounts – CosmicBeetle abuses valid accounts whose credentials it successfully obtains. “CosmicBeetle abuses valid accounts whose credentials it successfully obtains.”
  • [T1140] Deobfuscate/Decode Files or Information – ScRansom samples protect public RSA keys by encryption. “ScRansom samples protect public RSA keys by encryption.”
  • [T1110.001] Brute Force: Password Guessing – CosmicBeetle utilizes RDP and SMB brute-force attacks. “CosmicBeetle utilizes RDP and SMB brute-force attacks.”
  • [T1212] Exploitation for Credential Access – CosmicBeetle exploits known vulnerabilities to obtain credentials. “CosmicBeetle exploits known vulnerabilities to obtain credentials.”
  • [T1485] Data Destruction – CosmicBeetle renders some encrypted files unrecoverable. “CosmicBeetle renders some encrypted files unrecoverable.”
  • [T1486] Data Encrypted for Impact – CosmicBeetle encrypts sensitive files on compromised machines. “CosmicBeetle encrypts sensitive files on compromised machines.”

Indicators of Compromise

  • [File] context – 4497406D6EE7E2EF561C, 949AC88BB973BDBD214B (Auto variant of ScRansom)
  • [Filename] context – auto.exe, New.exe (Auto variant of ScRansom; static variants)
  • [Domain] context – www.lockbitblog.info – Fake LockBit leak site domain
  • [IP] context – 66.29.141.245 – Fake LockBit leak site IP
  • [Email] context – [email protected], [email protected] – Ransom note contact emails
  • [Tox ID] context – 91E3BA8FACDA7D4A0738ADE67846CDB58A7E32575531BCA0348EA73F6191882910B72613F8C4 – QTOX contact
  • [Tor link] context – onion addresses listed in IoCs – http://nonamef5njcxkghbjequlibwe5d3t3li5tmyqdyarnrsryopvku76wqd.onion, http://noname2j6zkgnt7ftxsjju5tfd3s45s4i3egq5bqtl72kgum4ldc6qyd.onion

Read more: https://www.welivesecurity.com/en/eset-research/cosmicbeetle-steps-up-probation-period-ransomhub/