Keypoints
- RansomHub is a ransomware-as-a-service variant affecting at least 210 victims across multiple sectors.
- It uses a double-extortion model: encrypting systems and exfiltrating data to extort victims.
- The ransom note typically does not include an initial ransom demand; victims are directed to a unique .onion URL via Tor.
- Initial access methods include phishing, exploiting known vulnerabilities, and password spraying.
- MITRE ATT&CK techniques observed include phishing, exploit public-facing apps, PowerShell, WMI, account creation/manipulation, RDP, masquerading, and more.
- Encryption uses Curve25519, with chunked encryption, specific processes targeted, and deletion of shadow copies to hinder recovery.
- Defensive mitigations emphasize patching, MFA, network segmentation, logging, backups, email security, and secure design practices.
MITRE Techniques
- [T1566] Phishing – RansomHub affiliates used mass phishing and spear-phishing emails to obtain initial access. ‘Used mass phishing and spear-phishing emails to obtain initial access.’
- [T1190] Exploit Public-Facing Application – RansomHub affiliates exploited known vulnerabilities to obtain initial access. ‘Exploited known vulnerabilities to obtain initial access.’
- [T1059.001] Command and Scripting Interpreter – RansomHub affiliates used PowerShell and scripts to automate intrusion. ‘Used PowerShell and scripts to automate intrusion.’
- [T1047] Windows Management Instrumentation – RansomHub affiliates abused Windows Management Instrumentation to execute malicious commands. ‘Abused Windows Management Instrumentation to execute malicious commands.’
- [T1136] Create Account – RansomHub affiliates created accounts to maintain access to victim systems. ‘Created accounts to maintain access to victim systems.’
- [T1098] Account Manipulation – RansomHub affiliates manipulated accounts to maintain and elevate access. ‘Manipulated accounts to maintain and elevate access.’
- [T1021.001] Remote Desktop Protocol – RansomHub affiliates logged onto systems using RDP for actions as the logged-on user. ‘Logged onto systems using RDP for actions as the logged-on user.’
- [T1036] Masquerading – RansomHub affiliates hid binaries by renaming executable names. ‘Hid binaries by renaming executable names.’
- [T1070] Indicator Removal on Host – RansomHub affiliates removed logs to inhibit cybersecurity response. ‘Removed logs to inhibit cybersecurity response.’
- [T1562.001] Impair Defenses: Disable or Modify Tools – RansomHub affiliates disabled endpoint detection and response tooling to avoid detection. ‘Disabled endpoint detection and response tooling to avoid detection.’
- [T1003] OS Credential Dumping – RansomHub affiliates used Mimikatz on Windows systems to gather credentials. ‘Used Mimikatz to gather credentials on Windows systems.’
- [T1110.003] Brute Force: Password Spraying – RansomHub affiliates used password spraying to obtain initial access. ‘Used password spraying to obtain initial access.’
- [T1018] Remote System Discovery – RansomHub affiliates attempted to list other systems by IP address or hostname. ‘Attempted to list other systems by IP address or hostname.’
- [T1046] Network Service Discovery – RansomHub affiliates attempted to list services running on remote hosts. ‘Attempted to list services running on remote hosts.’
- [T1210] Exploitation of Remote Services – RansomHub affiliates exploited remote services to gain unauthorized access. ‘Exploited remote services to gain unauthorized access.’
- [T1219] Remote Access Software – RansomHub affiliates used Anydesk for command and control. ‘Used Anydesk for command and control.’
- [T1048.002] Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol – RansomHub affiliates exfiltrated data over an asymmetrically encrypted non-C2 protocol. ‘Stole data by exfiltrating it over an asymmetrically encrypted network protocol.’
- [T1537] Transfer Data to Cloud Account – RansomHub affiliates exfiltrated data by transferring it to a controlled cloud account. ‘Exfiltrated data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service.’
- [T1486] Data Encrypted for Impact – RansomHub used encryption for ransomware operations. ‘Used encryption for ransomware operations.’
- [T1490] Inhibit System Recovery – RansomHub deleted volume shadow copies to inhibit recovery. ‘Deleted volume shadow copies to inhibit recovery.’
Indicators of Compromise
- [IP] Known IPs related to malicious activity – 8.211.2.97, 45.95.67.41, and other known IPs linked to activity (2023–2024).
- [URL] Known web requests related to malicious activity – http://188.34.188.7/555, http://89.23.96.203/333/1.exe (and other listed URLs).
- [File Path] Directory/file names associated with activity – C:Users%USERNAME%AppDataLocalProgramsPythonPython311Scriptscrackmapexec.exe, C:Users%USERNAME%DesktopIamBatMan.exe (and other paths).
- [Email] Email addresses associated with RansomHub communications – brahma2023[@]onionmail.org, [@]protonmail.com.
Read more: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a