RansomHub ransomware encrypted at least 210 victims worldwide

RansomHub ransomware encrypted at least 210 victims worldwide

The US government has issued a warning after identifying over 210 victims of the RansomHub ransomware group, a sophisticated ransomware-as-a-service (RaaS) operation. The group has been active since February 2024, targeting a wide range of sectors critical to national security and public welfare.

RansomHub, previously known as Cyclops and Knight, is believed to be collaborating with affiliates from other prominent ransomware groups such as LockBit and ALPHV.

The 210 confirmed victims span numerous sectors, including water and wastewater, information technology, government services, healthcare, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications infrastructure.

RansomHub affiliates employ a double-extortion strategy, wherein they not only encrypt systems but also exfiltrate sensitive data. The group’s ransom notes do not typically include initial ransom demands or payment instructions. Instead, victims receive a client ID and are directed to communicate with the group through a unique .onion URL on the Tor network.

The group allows a variable timeframe for ransom payments, ranging from three to 90 days, depending on the affiliate. If the ransom is not paid, the stolen data is published on RansomHub’s Tor-based data leak site.

RansomHub affiliates have been observed using various attack vectors to compromise their targets. Common methods include phishing emails, exploiting known vulnerabilities, and password spraying. Some of the notable vulnerabilities exploited by RansomHub include:

RansomHub affiliates have been observed using the above-mentioned vulnerabilities to gain initial access and establish persistence within targeted networks.

Once inside a network, RansomHub affiliates typically use a combination of network scanning tools like AngryIPScanner and Nmap, along with PowerShell-based techniques, to explore and map the compromised environment. For persistence, they create new user accounts or reenable disabled ones, while tools like Mimikatz are used to gather credentials and escalate privileges.

For lateral movement, the attackers have been known to use Remote Desktop Protocol (RDP), PsExec, AnyDesk, and other remote administration tools. Command-and-control (C2) frameworks like Cobalt Strike and Metasploit are also employed.

Data exfiltration is typically conducted through tools such as PuTTY, Amazon S3, WinSCP, and Rclone, depending on the affiliate and the specifics of the compromise.

RansomHub uses an Elliptic Curve Encryption algorithm, Curve 25519, to encrypt user-accessible files, making data recovery without the decryption key difficult.


Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025