3 September 2024

RansomHub ransomware encrypted at least 210 victims worldwide


RansomHub ransomware encrypted at least 210 victims worldwide

The US government has issued a warning after identifying over 210 victims of the RansomHub ransomware group, a sophisticated ransomware-as-a-service (RaaS) operation. The group has been active since February 2024, targeting a wide range of sectors critical to national security and public welfare.

RansomHub, previously known as Cyclops and Knight, is believed to be collaborating with affiliates from other prominent ransomware groups such as LockBit and ALPHV.

The 210 confirmed victims span numerous sectors, including water and wastewater, information technology, government services, healthcare, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications infrastructure.

RansomHub affiliates employ a double-extortion strategy, wherein they not only encrypt systems but also exfiltrate sensitive data. The group’s ransom notes do not typically include initial ransom demands or payment instructions. Instead, victims receive a client ID and are directed to communicate with the group through a unique .onion URL on the Tor network.

The group allows a variable timeframe for ransom payments, ranging from three to 90 days, depending on the affiliate. If the ransom is not paid, the stolen data is published on RansomHub’s Tor-based data leak site.

RansomHub affiliates have been observed using various attack vectors to compromise their targets. Common methods include phishing emails, exploiting known vulnerabilities, and password spraying. Some of the notable vulnerabilities exploited by RansomHub include:

RansomHub affiliates have been observed using the above-mentioned vulnerabilities to gain initial access and establish persistence within targeted networks.

Once inside a network, RansomHub affiliates typically use a combination of network scanning tools like AngryIPScanner and Nmap, along with PowerShell-based techniques, to explore and map the compromised environment. For persistence, they create new user accounts or reenable disabled ones, while tools like Mimikatz are used to gather credentials and escalate privileges.

For lateral movement, the attackers have been known to use Remote Desktop Protocol (RDP), PsExec, AnyDesk, and other remote administration tools. Command-and-control (C2) frameworks like Cobalt Strike and Metasploit are also employed.

Data exfiltration is typically conducted through tools such as PuTTY, Amazon S3, WinSCP, and Rclone, depending on the affiliate and the specifics of the compromise.

RansomHub uses an Elliptic Curve Encryption algorithm, Curve 25519, to encrypt user-accessible files, making data recovery without the decryption key difficult.


Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024