A Review of Active Ransomware Attack Organizations in 2024

1.Overview

Extortion attacks have now become one of the major cyber security threats to organizations around the world, and have been used by attackers as a criminal tool for seeking illegal economic benefits. In order to increase the probability of the victim paying ransom and increase the amount of ransom, the attacker has evolved from a pure malicious encryption to a double blackmail strategy of “stealing files + encrypted data.” What’s more, on the basis of double blackmail, DDoS attacks and harassment of third parties related to the injured parties are added to further evolve into “multiple blackmail.” In recent years, the mainstream threat form of blackmail attack has gradually transformed from the ransomware widespread dissemination of ransomware by ransomware gangs to the mode of “RaaS (ransomware as a service) + targeted attack” to collect high ransom. This mode is aimed at high-value targets, and affiliated members of RaaS improve their penetration capability and the success rate of landing blackmail loads by purchasing 0Day vulnerabilities, developing high-level malicious codes, and buying corporate insiders and intelligence. This combined chain of “targeted extortion + theft + exposure + sale” makes money by coercing victims to pay ransom. In order to effectively deal with that risk of blackmail, the defenders nee to change their understanding of the threat of blackmail and understand the operation mechanism of targeted blackmail in order to construct an effective enemy scenario. Targeted improvements in defense and responsiveness.

In the middle of 2024, blackmail attacks occurred frequently, and the attackers carried out extortion attacks through the broad-cast, non-targeted mode and targeted targeting mode. One of the factors in the continued activity of ransomware attacks is the constant updating of the RaaS business model. Raas is the infrastructure for ransomware attack organizations to develop and operate, including custom destructive ransomware, stealing components, ransomware, and toll channels. Various attack organizations and individuals can rent the RaaS attack infrastructure and share the spoils proportionally with the RaaS organization after the attack is completed. The rise and maturity of this business model has dramatically lowered the threshold for blackmail attacks, allowing attackers to target targets without even extorting software development skills. Another important factor is the assistance of Initial Access Broker (IAB). Iab achieves illegal profit by selling valid access credentials to the attacker without having to attack in person. The attackers make use of these credentials to carry out targeted blackmail attacks on specific targets, establish initial access and carry out subsequent malicious activities, and finally realize blackmail to the targets.

According to incomplete statistics, at least 90 extortion attack groups of different names have posted victim information through specific sources such as the Tor website or the Telegram channel in 2024. Of these, 21 of the 50 new extortion attack groups are linked to known groups. The victim information released by these organizations involves about 5,300 organizations from different countries or regions around the world, covering a wide range of industries. However, that actual numb of victims may well exceed this figure, since in some case an attacker may choose not to disclose or delete information for a variety of reason, such as after reaching an agreement with the victim, Or the victim pays a ransom in exchange for the removal of the information.

For information on ransomware and ransomware organizations, refer to the Computer Virus Encyclopedia (https: / / www.virusview.net /).

Table 1-1 Organizations Releasing Victim Information 2024

Extortionate attack group that published information about injured parties in 2024 (in alphabetical order)

0mega

8base

Abyss

Akira

Apos

Apt73

Arcus Media

Argonauts

Bianlian

Black Basta

Blackbyte

Blackcat / ALPHV

Blacksuit

Blackout

Bluebox

Brain Cipher

Cactus

Chort

Cicada 3301

Ciphbit

Cloak

Clop

Cuba

Daixin

Dan0n

Dark Angel / Dunghill

Dark Vault

Donex

Donut

Dragonforce

El dorado

Embargo

Everest

Fsociety

Fog

Gookie

Hellcat

Helldown

Hunters

Inc

Insane

Interlock

Kairos

Kill Security

Knight

Lockbit

Lynx

Mad Liberator

Lorenz

Mallox

Medusa

Medusa Locker

Meow

Metacryptor

Money Message

Monti

Mydata

Nitrogen

Noname

Orca

Play

Playboy

Pryx

Qilin

Qiulong

Ra World

Ransomcortex

Ransomexx

Ransomhouse

Ransomhub

Red

Rhysida

Safepay

Sexi (APT INC)

Sarcoma

Sensayq

Slug

Catch

Spacebears

Stormous

Termite

Threeam (3AM)

Trigona

Trinity

Trisec

Underground

Unsafe

Valencia

Vanir Group

Werewolves

At present, the mainstream threat form of blackmail attack has evolved into the operation mode of RaaS + targeted attack charging high ransom. Globally, industries such as manufacturing, healthcare, construction, energy, finance and public administration are frequently targeted by extortion attacks, causing serious losses to the global industrial output. The active blackmail in 2024 is now sorted out to form an overview of the attack organizations for sharing.

2.Classification of extortion and attack

There are three main types of active extortion attacks in 2024.

1.Encrypted file

The attacker using this kind of blackmail attack method will use the ransomware executor to encrypt the data file, and the executor will use a combination of specific encryption algorithms (such as AES, RSA, ChaChaCha20 and Salsa20) to encrypt the file. Most of the encrypted files cannot be decrypted temporarily without the decryption tool corresponding to the key, and only a few of the damaged files can be decrypted due to the logic error of the algorithm of the ransomware executor.

2.Stealing documents

The attacker using this kind of blackmail attack method does not use the ransomware executor to encrypt the data file, but only stays in the target system and steals the data file, and notifies the victim that the file is stolen after the theft is completed. If the ransom is not paid on time, the stolen data files will be made public or sold, putting pressure on the victim to pay the ransom as soon as possible.

3.Theft of files + encrypted files (double blackmail)

The attacker using this kind of blackmail attack method will stay in the target system for a period of time before launching the blackmail attack, during which the data files will be stolen, and after the stealing work is completed, the ransomware executor will be launched. Encrypting the file in the system and notifying the victim that the file is stolen, if the ransom is not paid on time, not only the file in the existing network environment can not be used because it is encrypted, It also exposes or sells stolen data files, putting pressure on victims to pay ransoms sooner rather than later.

3.Stocktaking of active extortion attack organizations in 2024

Review the ransomware attacks that occurred in 2024 and take inventory of active ransomware attack organizations based on attack activity and the number of victim information releases. The inventory is sorted by the initials of the organization name, in no particular order.

Table 3-1 Overview of active extortion organizations, 2024

Organization name

Time of occurrence

Typical Encryption Suffix

Detailed information on the organization’s encyclopedia

8base

March 2022

.8base

Akira

March 2023

.akira

Black Basta

April 2022

Basta

Blacksuit

May 2023

.blacksuit

Hunters

October 2023

.locked

Inc

July 2023

.inc

Lockbit

September 2019

A 9-digit personal ID with a random combination of letters and numbers

Medusa

Jun-21

.medusa

Play

June 2022

.play

Ransomhub

February 2024

Six digits of a random combination of letters and numbers

3.1 8base

The 8Base ransomware, whose ransomware code is based on Phobos ransomware development, was first discovered in March 2022. The attack group behind the ransomware operates on a model of RaaS and double blackmail, suspected to be an offshoot or rebranding of the RansomHouse ransomware attack group. The organization attacks the target system mainly by means of vulnerability weaponization, effective access credentials and other malicious software, and often uses SmokeLoader Trojan horse to realize initial access to the target system. After establishing initial access to the target system, the organization utilizes a variety of tools as attack equipment to implement other malicious actions. For example, Mimikatz, LaZagne, VNCPassView and other tools are used to steal credentials in the system, PsExec is used to realize horizontal movement, and Rclone is used to return the stolen data. So far, no public decryption tools have been found.

In 2024, the 8Base victim information release and data breach platform releases information on about 150 victims, and the actual number of victims may be higher.

Table 3-2 Overview of Base Organizations

Organization name

8base

Time of occurrence

March 2022

Typical penetration mode

Valid access credentials loaded with other malware

Typical Encryption Suffix

.8base

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows

Operation mode

Raas, based on ransom and trafficking data

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Finance, manufacturing, services, health care, construction

Country / Region of Common Victims

Usa, Brazil, UK, Canada, India

Ransom note

3.2 Akira

The Akira [1] ransomware was discovered in March 2023, and the attack organization behind it operated the ransomware through RaaS and dual ransomware models, operating in the RaaS model and extorting ransom sharing to achieve illegal profits, Ransom is used to decrypt encrypted files and to delete stolen data two parts. The blackmail attack organization penetrated the target system mainly through effective access credentials, VPN accounts without multiple identity authentication (MFA) and weaponization of vulnerabilities. Cisco VPN-related vulnerabilities (CVE-2023-20269) were used to achieve initial access to the target system. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions, such as using AnyDesk to remotely control computers and transfer files, using PowerTool to close processes related to anti-virus software, Use PCHunter, Masscan and AdFind to obtain specific information, use Mimikatz to steal credentials, and use Rclone and FileZilla to return stolen data.

Akira has ransomware for target systems such as Windows, Linux and VMware. In addition to the behavior of “stealing and encrypting,” there is a mode of only stealing and not encrypting, and after stealing the data of the victim system, the attacker chooses not to launch the ransomware. Instead, they threaten victims with blackmail through stolen data. Avast, a foreign security vendor, found vulnerability 0 in the Akira ransomware and released the decryption tool on June 29, 2023, but the tool is only applicable to the Akira ransomware executive version before June 29. Because the Akira ransomware developers have since fixed the vulnerability. The Akira ransomware attack group is suspected to be associated with Conti ransomware, which previously exited the ransomware market, in terms of code snippets of ransomware executors and addresses of encrypted digital currency wallets.

In 2024, the Akira Victim Information Publishing and Data Breach Platform releases about 310 victim information and stolen data, and the actual number of victims may be much higher.

Table 3-3 Overview of the Akira Organization

Organization name

Akira

Time of occurrence

March 2023

Typical penetration mode

Valid access credentials, accounts not configured with multiple identity authentication, weaponization of vulnerabilities

Typical Encryption Suffix

.akira

Decryption tools

Some versions have public decryption tools (it is possible to decrypt the encrypted files before June 29, 23)

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Raas, based on two-part ransom (decryption of files and removal of stolen data) and data trafficking

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Services, education, manufacturing, finance, health care, public administration

Country / Region of Common Victims

United States, France, United Kingdom, Canada, Australia, Netherlands

Ransom note

3.3 Black Basta

Black Basta ransomware was discovered in April 2022 and the attack organisation behind it operated the ransomware through a model of RaaS and double blackmail, Since each ransomware executor used by Black Basta is hard-coded with a unique identifier, it is assumed that the group is only using targeted mode to conduct ransomware attacks. The blackmail attack organization is mainly through effective access credentials, other malicious software and vulnerability weaponization of the penetration of the target system. Members of the group, who post in underground forums seeking network access credentials for the organization, have used the QBot Trojan and PrintNightmare related vulnerability CVE-2021-34527 to achieve initial access to the target system. After initial access to the target system is established, various tools are used as attack equipment to implement other malicious actions, such as establishing a remote connection using AnyConnect and TeamViewer, executing commands using PsExec, scanning using Netcat, Use Mimikatz to dump credentials and use Rclone to return stolen data. In December 2023, Security Research, a foreign network security research institution, released a decryption tool named “Black Basta Buster” [3] to recover files encrypted by Black Basta ransomware. But the tool only works with some versions of the ransomware variant between November 2022 and December 2023.

Black Basta ransomware attack group is suspected to be associated with BlackMatter and Conti ransomware attack groups that previously exited the ransomware market, as reflected in the ransomware executive part of the code segment, Victim information release and data leakage site design style, communication method and blackmail negotiation words and so on. So it is speculated that the Black Basta ransomware attack group may be an offshoot or rebranding of BlackMatter and Conti ransomware groups. In 2024, the Black Basta Victim Information Release and Data Breach platform released information on about 190 victims, and the actual number of victims may be higher.

Table 3-4 Overview of Black Basta Organization

Organization name

Black Basta

Time of occurrence

April 2022

Typical penetration mode

Effective access credentials, loaded with other malware and weaponized vulnerabilities

Typical Encryption Suffix

Basta

Decryption tools

It is possible to decrypt some variant versions between November 2022 and December 2023

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Raas, based on ransom and trafficking data

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Manufacturing, health care, services, finance, public administration

Country / Region of Common Victims

United States, Canada, United Kingdom, Australia, Italy

Ransom note

3.4 Blacksuit

The BlackSuit ransomware was first discovered in May 2023 and the attack group behind it operated with a double blackmail strategy. The group has a more complex identity background and is considered a rebranding of Royal’s ransomware. The Royal was renamed by the Zeon group, which is suspected to have been built by the original members of the Conti group. The Conti group was disbanded due to factors such as source code leakage, and the Conti group was considered the successor to Ryuk, with layers of complex relationship. The BlackSuit organization has not yet been found to recruit affiliate members through the RaaS model. Blacksuit has ransomware for target systems such as Windows, Linux and VMware. The organisation has mainly infiltrated target systems through the weaponization of vulnerabilities, effective access credentials and other malware such as SystemBC and GootLoader. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions. For example, use tools such as AnyDesk, LogMeIn and AteraAgent to remotely control computers and transmit files, use Mimikatz and Nirsoft to steal credentials in the system, and use Rclone to return stolen data. So far, no public decryption tools have been found.

In 2024, the BlackSuit victim information release and data breach platform releases information on about 150 victims, and the actual number of victims may be higher.

Table 3-5 Overview of BlackSuit Organizations

Organization name

Blacksuit

Time of occurrence

May 2023

Typical penetration mode

Effective access credentials, loaded with other malware and weaponized vulnerabilities

Typical Encryption Suffix

.blacksuit

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Based on ransom and trafficking data

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Manufacturing, health care, education, finance, public administration

Country / Region of Common Victims

United States, United Kingdom, Japan, Netherlands, Canada

Ransom note

3.5 Hunters

The Hunters (aka Hunters International) ransomware was first discovered in October 2023, and the attack organisation behind it operated the ransomware using a model of RaaS and double blackmail. The ransomware code used by the group is highly similar in technical architecture and operational strategies to Hive, which has been targeted by law enforcement agencies. That similarity led security researchers to suspect that Hunters could be an offshoot or rebrand of Hive. However, the Hunters organisation denied having a direct relationship with Hive, claiming they simply bought Hive’s source code and network infrastructure and, on that basis, optimised using the Rust language to create a standalone brand. The Hunters Group has penetrated the target system mainly through the weaponization of vulnerabilities, effective access credentials and other malicious software. The organization often uses SharpRhino Trojans disguised as Angry IP Scanner network scanners to achieve initial access to the target system. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions. Use tools such as Pink, AnyDesk, TeamViewer to remotely control computers, transfer files and move horizontally, and transfer stolen data to the MEGA cloud platform. So far, no public decryption tools have been found.

In 2024, the Hunters victim information release and data breach platform releases information on about 230 victims, and the actual number of victims may be higher.

Table 3-6 Overview of Hunters Organization

Organization name

Hunters (aka Hunters International)

Time of occurrence

October 2023

Typical penetration mode

Effective access credentials, weaponization of vulnerabilities, and other malware

Typical Encryption Suffix

.locked

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Raas, based on ransom and trafficking data

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Manufacturing, services, finance, health care, education, public administration

Country / Region of Common Victims

United States, United Kingdom, Canada, France, China

Sample Letter of Blackmail

3.6 Inc

The attack group behind the INC ransomware, which was first discovered in July 2023, operated with a double blackmail strategy. This blackmail attack organization mainly uses the vulnerability of NetScaler product CVE-2023-3519 to penetrate the target system by means of vulnerability weaponization, effective access credentials and other malicious software. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions. For example, using tools such as AnyDesk, TightVNC, and PuTTY to implement remote control, transmission tools and horizontal movement, and using tools such as NetScan, Advanced IP Scanner, and Mimikatz to implement network scanning and credential theft, transferring stolen data to the MEGA cloud platform. So far, no public decryption tools have been found.

In March 2024, the INC group sold the source code for its ransomware and network infrastructure on hacking forums for $300,000 and limited the number of potential buyers to three. In July, the newly emerging Lynx Ransomware group used ransomware and network infrastructure for ransomware attacks similar to the INC group, and the subsequent Lynx group claimed to have purchased the INC group’s source code. In 2024, the INC victim information release and data breach platform releases information on about 160 victims, and the actual number of victims may be higher.

Table 3-7 Overview of INC Organization

Organization name

Inc

Time of occurrence

July 2023

Typical penetration mode

Effective access credentials, weaponization of vulnerabilities, and other malware

Typical Encryption Suffix

.inc

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Based on ransom and trafficking data

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Manufacturing, services, finance, health care, education, public administration

Country / Region of Common Victims

Usa, UK, Germany, Canada, Australia

Sample Letter of Blackmail

3.7 Lockbit

The LockBit ransomware [4] was first discovered in September 2019, initially known as ABCD ransomware because of its encrypted filename suffix of .abcd. The attack organization behind it operates the ransomware through RaaS and multi-ransomware models, and profits mainly from RaaS and ransom sharing. Threat actors using the ransomware carry out ransomware attacks in both non-targeted and targeted modes. The group released ransomware version 2.0 in June 2021, adding the ability to remove disk shadow and log files, along with the release of a proprietary data theft tool, StealBit. A “threat to expose (sell) corporate data + encrypted data” double blackmail strategy was used. & nbsp; In August 2021, the group & rsquo; s attack infrastructure spectrum increased support for DDoS attacks. In June 2022, the ransomware was updated to version 3.0, which is also known as LockBit Black due to the fact that part of the code of version 3.0 overlaps with the BlackMatter ransomware code, This reflects the possibility of personnel flow and capability exchange among different blackmail attack organizations. On February 20, 2024, Operation Cronos, a coalition of multinational law enforcement agencies, successfully dealt a blow to the LockBit extortion attack group, with law enforcement agencies taking over the cyber infrastructure used by the group for attacks, And provides the victim with a key for decryption. The operation did not wipe out LockBit, which resumed its extortion campaign after a lull and announced on December 19, 2024 that it planned to launch a version of LockBit 4.0 in February 2025. The LockBit organization primarily achieves initial access to the target system through effective access credentials, weaponization of vulnerabilities and other malware. So far, no public decryption tools have been found.

In October 2023, Boeing was named as a victim by the LockBit blackmail attack group, Antiy CERT has analyzed the attack process recovery, the list of attack tools, the mechanism of extorting samples, the multi-party response after the attack effect, the loss assessment, and the process visual repeat. It also analyzes the defense-side problem exposed in the incident and the mode of RaaS + directed blackmail, and puts forward suggestions on defense and governance [5]. In 2024, the LockBit victim information release and data breach platform releases information and stolen data about 520 victims, and the actual number of victims may be much higher.

Table 3-8 Overview of the LockBit Organization

Organization name

Lockbit

Time of occurrence

September 2019

Typical penetration mode

Effective access credentials, weaponization of vulnerabilities, and other malware

Typical Encryption Suffix

A 9-digit personal ID with a random combination of letters and numbers

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux, macOS, VMware ESXi

Operation mode

Raas, based on ransom and trafficking data

Patterns of victimization

Encryption leads to paralysis, theft, disclosure or sale of data, DDoS interference

Industry of common victims

Finance, services, construction, education, manufacturing, public administration

Country / Region of Common Victims

Usa, UK, Germany, Canada, India, Japan

Sample Letter of Blackmail

3.8 Medusa

The Medusa ransomware was first detected in June 2021, unrelated to the Medusa Locker ransomware that emerged in 2019. The organization attacks target systems mainly by means of weaponization of vulnerabilities, effective access credentials and brute force cracking of Remote Desktop Protocol (RDP). The Fortinet-related vulnerability (CVE-2023-48788) was used to achieve initial access to the target system. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions. For example, use ConnectWise, PDQ Deploy, AnyDesk and other tools to remotely control computers and transfer files, and use NetScan to find other targets that can be attacked. So far, no public decryption tools have been found.

In 2024, its victim information release and data breach platform has about 210 published victim information, and the actual number of victims may be higher.

Table 3-9 Medusa Organization overview

Organization name

Medusa

Time of occurrence

Jun-21

Typical penetration mode

Weaponization of vulnerabilities, effective access credentials, RDP brute force cracking

Typical Encryption Suffix

.medusa

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux

Operation mode

Raas, based on ransom and trafficking data

Patterns of victimization

Encryption leads to paralysis, theft, DDoS interference, disclosure and sale of stolen data

Industry of common victims

Manufacturing, education, services, finance, construction, public administration

Country / Region of Common Victims

Usa, UK, Canada, India, Australia, Italy

Ransom note

3.9 Play

Play (aka PlayCrypt) ransomware [6] was first discovered in June 2022, with the attack organisation behind it operating the ransomware through a model of double blackmail and claiming not to operate through a RaaS model, Attackers using the ransomware carry out ransomware attacks in both non-targeted and targeted modes. In that method, the blackmail attack organization penetrate the target system mainly through effective access credentials and weaponization of vulnerability, Initial access to the target system has been achieved using Fortinet (CVE-2018-13379, CVE-2020-12812) and Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) related vulnerabilities. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions. For example, use AdFind to discover information related to Active Directory, use Grixba to steal specific information, use tools such as GMER, Iobit and PowerTool to disable anti-virus software and delete log files, and use SystemBC to implement horizontal movement. The credentials in the system are stolen using Mimikatz, and the files to be stolen are packed using WinRAR and sent back through WinSCP. So far, no public decryption tools have been found.

Play ransomware attacks are suspected to be associated with Conti, Royal, Hive and Nokoyawa ransomware attacks in terms of infrastructure used for attacks and techniques and tactics used in ransomware attacks. In 2024, its victim information release and data breach platform has about 350 published victim information, and the actual number of victims may be higher.

Table 3-10 Play Organization Overview

Organization name

Play (aka PlayCrypt)

Time of occurrence

June 2022

Typical penetration mode

Effective access credentials and weaponization of vulnerabilities

Typical Encryption Suffix

.play

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Based on ransom and trafficking data

Patterns of victimization

Encryption leads to paralysis, theft, DDoS interference, disclosure and sale of stolen data

Industry of common victims

Telecommunications, health care, services, finance, education

Country / Region of Common Victims

United States, Germany, Canada, Sweden, Netherlands

Ransom note

3.10 Ransomhub

Ransomhub ransomware [7] was first discovered in February 2024, and the attack organisation behind it operated the ransomware through a model of RaaS and double blackmail, The ransomware attack organization is mainly through vulnerability weaponization, effective access credentials and other malicious software to penetrate the target system. After initial access to the target system is established, a variety of tools are used as attack equipment to implement other malicious actions. It has used Confluence (CVE-2023-22515), Citrix (CVE-2023-3519), Fortinet (CVE-2023-27997) related vulnerabilities to achieve initial access to the target system. After successful access, the user account is created to realize persistence, EDRKillShifter is used to disable and close the security protection tools, and then Angry IP Scanner, Nmap, NetScan and other tools are used to scan and discover other attackable targets. Mimikatz, LaZagne and other tools are used to collect credentials in the system, PsExec, AnyDesk, Connectwise and other tools are used to realize remote access and horizontal movement, and PuTTY, Rclone and other tools are used to return stolen data. So far, no public decryption tools have been found.

The ransomhub blackmail attack group uses ransomware payloads and techniques and tactics that bear similarities to the Knight group and are suspected of being a rebranding or successor to the Knight group. In 2024, the RansomHub victim information release and data breach platform releases information on about 530 victims, and the actual number of victims may be higher.

Table 3-11 Overview of the RansomHub Organization

Organization name

Ransomhub

Time of occurrence

February 2024

Typical penetration mode

Effective access credentials, weaponization of vulnerabilities, and other malware

Typical Encryption Suffix

Six digits of a random combination of letters and numbers

Decryption tools

So far, no public decryption tools have been found

Encrypt the target system

Windows, Linux, VMware ESXi

Operation mode

Raas, based on ransom and trafficking data

Patterns of victimization

Encryption causes paralysis, theft, disclosure or trafficking of data

Industry of common victims

Finance, services, construction, education, manufacturing, public administration

Country / Region of Common Victims

Usa, UK, Canada, Italy, India, Brazil

Sample Letter of Blackmail

4.Summary

While law enforcement agencies in various countries have stepped up efforts to crack down on extortion attacks, the number of cases of extortion is still on the rise. There are many factors that lead to the increase in the activity of blackmail attacks: The attackers can quickly exploit new vulnerabilities, and the vulnerability of telecommuting increases. The application of new technologies provides more attack opportunities for ransomware; IAB profits by selling access credentials, which attackers use to carry out targeted attacks; and the development of artificial intelligence technologies has both enhanced defense capabilities. It is also used by attackers to improve the efficiency of attacks, the mutual use of techniques and tactics between organizations of extortion attacks, and the frequent occurrence of supply chain-style extortion attacks, all of which make the number of victims increasing. In the face of the increasingly severe situation of blackmail attacks, law enforcement agencies and cyber security agencies have taken many measures to strengthen their defense and crackdown efforts. But the complexity and diversity of extortion attacks still pose a huge challenge to global cybersecurity.

In order to effectively deal with that risk of blackmail, the defenders nee to change their understanding of the threat of blackmail and understand the operation mechanism of targeted blackmail in order to construct an effective enemy scenario. Targeted improvements in defense and responsiveness. In the report [5], Antiy said that “correct perception is the basis for effective defense improvement” in the analysis of the blackmail attack on Boeing. At present, the domestic protection against blackmail attacks usually stays at the stage of the original ransomware. Many people do not realize that extortion attacks have been committed by persistent targeted intrusions, stealing data, disabling encrypted data systems, extorting money, mining data-related value for secondary use, selling data and reporting to regulators. The public theft of data constitutes a value infringement chain, and has formed an extremely large-scale criminal industry. In such a context, the risk of being blackmailed is no longer simply a form of consequence of data loss and business suspension, but a series of chain risks that all data stolen will be trafficked and made public.

Facing the systematic attack operation mode of the attacker, the defender should establish the systematic defense mechanism and operation strategy to deal with the threat of blackmail attack. For systematic attacks, it is necessary to move forward the gateway, forward deployment, form a deep, closed-loop operation. Increases the ability of the attacker to detect fire and advance to the outside. reduces the possibility of the attacker entering the core. Improving the manageability of networks and assets is the basis of the work: Actively shaping and reinforcing the security environment, strengthening the constraint and management of exposed and attack-able surfaces, and strengthening the control of upstream entry points of the supply chain. Initiate a comprehensive log audit analysis and monitoring operation. Build the depth of defense from topology to system side, build layers of defense against attacker detection, launch, exploit vulnerabilities, code operation, persistence, horizontal movement and other behaviors, and especially build host system side protection. Take it as the last line of defense and the cornerstone of defense, and build the fine-grained governance capability around the identification and control of enforcement entities. Finally, based on the defense system to realize the perception, interference, blocking the directional attack killing chain of the actual combat operation results.

Appendix I: Link for reference

[1] Antiy.akira ransomware analysis suspected of using targeted attack patterns [R / OL]. (2023-05-30)

Https: / / www.antiy.cn / research / notice & report / research _ report / Akira _ Ransomware _ Analysis.html

[2] Avest.dectyped: Akira Ransomware [R / OL]. (2023-06-29)

Https: / / decided.avast.io / threatresearch / decipted-akira-ransomware /

[3] Security Research Lab. Black Basta Buster [R / OL]. (2023-12-30)

Https: / / github.com / srlabs / black-basta-buster

[4] Sample Analysis and Defense Thinking on Targeted Blackmail [R / OL]. (2023-11-17)

Https: / / www.antiy.cn / research / notice & report / research _ report / LockBit.html

[5] Antiy.boeing Encountered with Blackmail Attack Analysis and Resuming – Threat Trend Analysis and Defense Thinking of Targeted Blackmail [R / OL]. (2023-12-30)

Https: / / www.antiy.cn / research / notice & report / research _ report / BoeingReport.html

[6] Antiy.play ransomware analysis [R / OL]. (2023-10-20)

Https: / / www.antiy.cn / research / notice & report / research _ report / PlayCrypt _ Analysis.html

[7] Antiy.analysis of the Active RansomHub Ransomware Attack Group [R / OL]. (2024-09-12)

Https: / / www.antiy.cn / research / notice & report / research _ report / RansomHub _ Analysis.html

Appendix II: About Antiy

Anty is committed to enhancing the network security defense capabilities of its customers and effectively responding to security threats. Through more than 20 years of independent research and development, Antiy has developed technological leadership in areas such as threat detection engines, advanced threat countermeasures, and large-scale threat automation analysis.

Antiy has developed IEP (Intelligent Endpoint Protection System) security product family for PC, server and other system environments, as well as UWP (Unified Workload Protect) security products for cloud hosts, container and other system environments, providing system security capabilities including endpoint antivirus, endpoint protection (EPP), endpoint detection and response (EDR), and Cloud Workload Protection Platform (CWPP) , etc. Antiy has established a closed-loop product system of threat countermeasures based on its threat intelligence and threat detection capabilities, achieving perception, retardation, blocking and presentation of the advanced threats through products such as the Persistent Threat Detection System (PTD), Persistent Threat Analysis System (PTA), Attack Capture System (ACS), and TDS. For web and business security scenarios, Antiy has launched the PTF Next-generation Web Application and API Protection System (WAAP) and SCS Code Security Detection System to help customers shift their security capabilities to the left in the DevOps process. At the same time, it has developed four major kinds of security service: network attack and defense logic deduction, in-depth threat hunting, security threat inspection, and regular security operations. Through the Threat Confrontation Operation Platform (XDR), multiple security products and services are integrated to effectively support the upgrade of comprehensive threat confrontation capabilities.

Antiy provides comprehensive security solutions for clients with high security requirements, including network and information authorities, military forces, ministries, confidential industries, and critical information infrastructure. Antiy has participated in the security work of major national political and social events since 2005 and has won honors such as the Outstanding Contribution Award and Advanced Security Group. Since 2015, Antiy’s products and services have provided security support for major spaceflight missions including manned spaceflight, lunar exploration, and space station docking, as well as significant missions such as the maiden flight of large aircraft, escort of main force ships, and Antarctic scientific research. We have received several thank-you letters from relevant departments.

Antiy is a core enabler of the global fundamental security supply chain. Nearly a hundred of the world’s leading security and IT enterprises have chosen Antiy as their partner of detection capability. At present, Antiy’s threat detection engine provides security detection capabilities for over 1.3 million network devices and over 3 billion smart terminal devices worldwide, which has become a “national-level” engine. As of now, Antiy has filed 1,877 patents in the field of cybersecurity and obtained 936 patents. It has been awarded the title of National Intellectual Property Advantage Enterprise and the 17th (2015) China Patent Excellence Award.

Antiy is an important enterprise node in China emergency response system and has provided early warning and comprehensive emergency response in major security threats and virus outbreaks such as “Code Red”, “Dvldr”, “Heartbleed”, “Bash Shellcode” and “WannaCry”. Antiy conducts continuous monitoring and in-depth analysis against dozens of advanced cyberspce threat actors (APT groups) such as “Equation”, “White Elephant”, “Lotus” and “Greenspot” and their attack actions, assisting customers to form effective protection when the enemy situation is accurately predicted.