Author:
Kaustubh Jagtap, Product Marketing Director, SafeBreach
In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting newly added coverage for several recently discovered or analyzed ransomware and malware variants, including NoEscape ransomware, AvosLocker ransomware, and Retch ransomware, amongst others. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats. Additional details about the threats and our coverage can be seen below.
The NoEscape ransomware is a newly discovered ransomware variant (first identified in May 2023) that leverages the ransomware-as-service (RaaS) model to target victims. It is believed that the attackers that created the NoEscape ransomware built it and its supporting infrastructure from scratch – making it different from other ransomware variants and families that often have some basic similar source code. The ransomware creators offer their affiliates a platform that can help them build and manage different payloads for Windows and Linux environments and use a profit-sharing model to keep a share of the ransom.
It is believed that a NoEscape ransomware payload can support different types of encryption models, including full, fast, or strong. They also use RSA and ChaCHA20 to encrypt certain kinds of files. A shared encryption feature allows for a single encryption key to be shared across all infected files in a network as opposed to each host having a unique key. This option is available to allow for efficient encryption and rapid decryption should the victim pay. NoEscape ransom notes are typically saved as text-file labeled “HOW_TO_RECOVER_FILES.TXT” in each folder that contains encrypted files. All encrypted files will have a ten-character identifying extension appended to them. Examples of observed extensions include “.CCBDFHCHFD” and “.CBCJDHIHBB”.
The SafeBreach platform has been updated with the following attacks to ensure our customers can validate their security controls against NoEscape ransomware.
On October 11th, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an updated advisory/ US-CERT Alert AA23-284A highlighting newly discovered and updated IOCs and TTPs associated with the AvosLocker ransomware variant. AvosLocker operates on a ransomware-as-a-service (RaaS) model and its affiliates have previously targeted critical infrastructure entities in the U.S. These threat actors target and compromise Windows, Linux, and VMware ESXi environments by using legitimate software and open-source remote system administration tools. AvosLocker affiliates then use exfiltration-based data extortion tactics with threats of leaking and/or publishing stolen data.
Some of the open-source tools used by the affiliates include:
FBI and CISA recommend testing existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
The SafeBreach platform has been updated with the following new attacks to ensure our customers can validate their security controls against the AvosLocker ransomware variant.
Researchers from FortiGuard Labs recently analyzed and identified two new ransomware variants – Retch and S.H.O that affect Windows users. These two ransomware variants have been classified as critical and researchers encourage organizations to ensure protection against these new variants.
The SafeBreach platform has been updated with the following attacks to ensure our customers can validate their security controls against these ransomware variants:
Researchers from NSFocus recently discovered an new advanced persistent threat (APT) group called AtlasCross that is leveraging Red Cross Blood Donation requests as phishing lures to target and infect victims with a previously unknown trojan called AtlasAgent. It is believed that these phishing attacks contain a macro-enabled Word document (.docm) attachment that urges the victim to click “Enable Content” to view the hidden content. This action triggers a malicious macro that infect the Windows device with the AtlasAgent malware.
AtlasAgent is a custom C++ trojan and its core functions include extracting host and process details, preventing the launch of multiple programs, executing additional shellcode on the compromised machine, and downloading files from the attacker’s C2 servers. the malware sends information to the attacker’s servers, including local computer name, network adapter information, local IP address, network card info, OS system architecture and version, and a running process list. Researchers believe that this advanced attacker is very adept at leveraging various existing hacker technologies and integrating them into their own stack, creating a very formidable opponent that can be very hard to detect for organizations.
The SafeBreach platform has been updated with the following attacks to ensure our customers can validate their security controls against this malware variant:
Threat researchers from Mandiant have discovered several attacks leveraging infected USB drives to target public and private sector entities. The SOGU malware is attributed to a China-linked threat actor, TEMP.Hex. Researchers believe that the threat actor primarily used these attacks to collect sensitive information in support of Chinese national security and economic interests. Victims were located in Europe, Asia, and the United States and primarily belonged to the construction and engineering, business services, government, health, transportation, and retail verticals.
SOGU threat actors use an infected USB drive to deliver the primary infection vector. The malicious drive is believed to contain tools that are designed to drop a malicious payload via DLL hijacking. Once they establish presence on victim networks, they typically side-load another malicious DLL file called KORPLUG. The malware infects the victim by dropping a batch file onto the RECYCLE.BIN file path that then runs host reconnaissance commands and outputs the results to a separate file. To maintain its persistence on the system, the malware creates a directory that masquerades as a legitimate program and sets the directory’s attribute to hidden. At the last stage of the attack, the malware will exfiltrate any data that has been staged. The malware can also be copied onto new removable drives plugged into an infected system. This allows the malicious payloads to spread to other systems and potentially collect data from air-gapped systems.
The SafeBreach platform has been updated with the following attacks to ensure our customers can validate their security controls against this malware variant:
Recent research has revealed that the threat group Scattered Spider is responsible for the recent ransomware attacks against the casino groups MGM International and Caesars Entertainment. This group (thought to have founded in May 2022) is also known as UNC3944 and primarily comprises of hackers aged 19-22 based in the U.S. and the U.K.
Researchers have tracked the threat group leveraging ALPHV/BlackCat ransomware in the middle of this 2023 to target VMware ESXi servers. They are believed to be able use their growing arsenal of advanced tactics, techniques, and procedures (TTPs) to target extremely complex and hybrid enterprise networks. The threat actors are adept at leveraging stolen PII data such as family names, residential addresses, etc. and using the threat of physical violence to force targeted victims to reveal credentials for corporate network access.
Microsoft researchers provided more detailed information about the threat group highlighting that the group’s use of highly advanced TTPs (including adversary-in-the-middle techniques) meant that organizations would have to leverage unconventional techniques and procedures to protect themselves.
The SafeBreach platform has been updated with the following attacks to ensure our customers can validate their security controls against the threat group:
SafeBreach now offers a complimentary and customized real-world ransomware assessment, RansomwareRx, that allows you to gain unparalleled visibility into how your security ecosystem responds at each stage of the defense process. This ransomware assessment includes:
Empower your team to understand more about ransomware attacks, methodologies, and behaviors—all through the lens of the attacker. Request your complimentary RansomwareRx assessment today.