Thursday, December 5, 2024
HomeCVE/vulnerabilityCosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World

CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World

Published on

SIEM as a Service

CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab, with ScRansom, a custom-built ransomware that continues to evolve. 

The threat actor has been actively targeting SMBs worldwide, exploiting vulnerabilities to gain access to their systems and experimenting with the leaked LockBit builder, attempting to leverage its reputation by impersonating the notorious ransomware gang. 

It is believed, with medium confidence, that CosmicBeetle is a new affiliate of RansomHub, a rising ransomware-as-a-service group, which is a relatively new ransomware actor, and has been actively targeting SMBs in Europe and Asia with its custom-developed ScRansom. 

- Advertisement - SIEM as a Service

While ScRansom is not particularly sophisticated, CosmicBeetle has successfully compromised several interesting targets due to their immature approach and the use of leaked LockBit tools. 

ESET telemetry and code analysis strongly suggest ScRansom is a new tool developed by CosmicBeetle. Code similarities, overlapping deployments, and shared components with other CosmicBeetle tools provide compelling evidence. 

While previous attribution to a Turkish software developer was inaccurate, the encryption scheme used in ScHackTool is likely adapted from an open-source algorithm, which further supports the connection between ScRansom and CosmicBeetle, solidifying the attribution.

NONAME dedicated leak site on Tor

CosmicBeetle, a ransomware group, primarily targets SMBs in various sectors using brute-force attacks and exploits known vulnerabilities such as EternalBlue, CVE-2023-27532, AD privilege escalation vulnerabilities, FortiOS SSL-VPN vulnerability, and Zerologon.

The group’s victims include companies in manufacturing, pharmaceuticals, legal, education, healthcare, technology, hospitality, financial services, and regional government.

CosmicBeetle communicates with its victims through email and qTox, a messaging application, and uses a custom ransomware named NONAME.

Website mimicking the official LockBit leak site, set up by CosmicBeetle

A less-established ransomware group impersonated the well-known LockBit to enhance their credibility by first creating a fake LockBit leak site with similar design and reused compromised victim data from LockBit.

Simulating Cyberattack Scenarios With All-in-One Cybersecurity Platform – Watch Free Webinar

Later, they even built a ransomware sample using the leaked LockBit builder and included a Turkish ransom note with their contact info. Evidence suggests CosmicBeetle might also be a new affiliate of RansomHub, as their tools and behaviors were observed in a recent RansomHub attack.

User interface of ScRansom

ScRansom, a ransomware developed by CosmicBeetle, employs a complex encryption scheme involving AES and RSA keys. It encrypts files on various drives and can also permanently delete files.

The ransomware is initially launched by the threat actor through manual interaction, but newer versions automate the process. Victims must pay a ransom to obtain a decryption key, which is required to recover their encrypted files.

However, the decryption process is complex and may fail due to various factors, including multiple encryption sessions and potential file destruction.

Encryption scheme utilized by the latest ScRansom samples

It has been deploying a new custom ransomware, ScRansom, after abandoning Scarab. Despite attempts to leverage LockBit’s reputation, ScRansom remains complex and prone to errors. 

According to ESET research, the actor’s deployment of RansomHub payloads on the same machine as ScRansom suggests a potential affiliation with RansomHub. 

The ongoing development of ScRansom poses significant risks to victims, as successful decryption is uncertain and may require extensive manual effort.

Simulating Cyberattack Scenarios With All-in-One Cybersecurity Platform – Watch Free Webinar

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks

I-O DATA DEVICE, INC. has announced that several critical vulnerabilities in their UD-LT1 and...

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the...

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially...

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks

I-O DATA DEVICE, INC. has announced that several critical vulnerabilities in their UD-LT1 and...

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the...

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address...