Monday, January 13, 2025
HomeRansomwareBeware!! Avaddon Ransomware Attack Organizations in a variety of Sectors Around The...

Beware!! Avaddon Ransomware Attack Organizations in a variety of Sectors Around The Globe

Published on

Recently, the Australian Cyber Security Centre (ACSC) along with the Federal Bureau of Investigation (FBI) has detected ongoing attacks of the “Avaddaon ransomware,” that is targeting the organizations in a variety of sectors.

The cybersecurity researchers at ACSC have claimed in their report that this Avaddon ransomware campaign is continuously targeting the organizations globally in various industries, that includes the sectors like government, finance, energy, manufacturing, and healthcare organizations.

According to the FBI flash alert report of last week cleared that the hackers of this Avaddon ransomware are trying to break the networks of manufacturing, healthcare, and other private sector organizations.

The Avaddon ransomware is used by the threat actors as a ransomware-as-a-service campaign and it’s being spread using phishing and malicious email spam operations so that the hackers can easily deliver the malicious JavaScript files.

Targeted Countries and Sectors

After thoroughly analyzing the Avaddon ransomware, the specialists have listed all the countries as well as the sectors that are targeted by this ransomware, and here we have mentioned them below.

Targeted countries:-

  • Australia  
  • Belgium 
  • Brazil   
  • Canada 
  • China    
  • Costa Rica 
  • Czech Republic 
  • France 
  • Germany   
  • India 
  • Indonesia   
  • Italy 
  • Jordan   
  • Peru 
  • Poland   
  • Portugal 
  • Spain    
  • United Arab Emirates 
  • United Kingdom   
  • United States

Targeted Sectors:-

  • Academia
  • Airlines
  • Construction
  • Energy
  • Equipment
  • Financial
  • Freight and Transport
  • Government
  • Health
  • Hospitality
  • Information Technology
  • Law Enforcement
  • Manufacturing 
  • Marketing
  • Retail
  • Pharmaceutical
  • Virtual Entertainment

Avaddon conceives bare DDoS strikes

During the investigation, the security analysts have found that the threat actors who were behind Avaddon ransomware were attacking with denial-of-service (DDoS) attacks.

But the report of the FBI has cleared that they have not yet found any evidence regarding DDoS attacks. However, this ransomware attack has been first found in January 2021.

Avaddon Ransomware

Moreover, at that time the experts reported about two other ransomware operations (SunCrypt and RagnarLocker), and here the most interesting thing about their operation is that they both were using this new manoeuvre.

Hackers Used the Stolen Data as Leverage

According to the report, this ransomware was initially detected in February 2019, and in June the hackers started recruiting affiliates so that they can execute its operation.

Avaddon was rewarded each affiliate nearly 65% of ransom payments, and on the other side, the operators of this Avaddon ransomware were getting nearly 35% share of the accumulated ransom.

For the decryption tool (Avaddon General Decryptor), the affiliates of Avaddon generally demands an average ransom payment of about $41,627 (0.73 bitcoins).

Moreover, the hackers of the Avaddon RaaS operation also ask each and every affiliate to follow some rules that are being set by them.  

Mitigations

The experts said that these kind of attacks are quite common, but one should know how to keep themselves safe from such attacks. However, the researchers have recommended some mitigations for the organizations, and here we have mentioned them below:-

  • Always keep the operating systems updated with the latest security fixes. 
  • Always keep the applications, and antivirus tools up to date.
  • Always keep scanning the emails and attachments to detect and block malware.
  • Implement training and processes to recognize phishing and externally sourced emails.
  • Always do a regular test of your backups, and also have an offline, encrypted backup of data.
  • Regularly perform backup procedures and keep backups offline in a separated network.

Before encrypting the systems the Avaddon ransomware affiliates also steal the data from their victims’ networks only for the double-extortion, and they are well-known for this exercise.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass...

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Microsoft Warns of MFA Issue Affecting Microsoft 365 users

Microsoft has issued a warning regarding an ongoing issue with Multi-Factor Authentication (MFA) that...

RedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation

Researchers identified RedCurl APT group activity in Canada in late 2024, where the attackers...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which...

1000’s Of SonicWall Devices Remain Vulnerable To CVE-2024-40766

A recent investigation revealed that the Akira and Fog ransomware groups are actively exploiting...