Saturday, January 11, 2025
HomeCyber CrimeINC Ransom Group Exfiltrates Data Before Encrypting & Threatens Public Exposure

INC Ransom Group Exfiltrates Data Before Encrypting & Threatens Public Exposure

Published on

Hackers exfiltrate data first before encrypting it to increase their bargaining power during ransom negotiations. 

Threats of public exposure of private information accelerate up the urgency for victims to pay a ransom immediately.

Secureworks Counter Threat Unit researchers are tracking the INC Ransom group known as GOLD IONIC. 

INC Ransom Group Exfiltrate Data

Emerging in August 2023, this threat group employs double extortion tactics – exfiltrating data before encryption, then threatening public exposure to pressure victims into paying ransoms.

Between August 2023 and March 2024, the Tor leak site of GOLD IONIC published the names of 72 victims, adding 7 in April 2024. It has spread globally despite focusing on American victims from the industrial, healthcare, and education sectors.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

SecureWorks said that GOLD IONIC seems to be a solo group that encrypts files for ransom rather than having affiliates.

There appears to be a consistent pattern in monthly numbers, with possible exceptions posted as batched releases.

Number of victims posted to GOLD IONIC’s leak site from August 2023 through March 2024 (Source – Secureworks)

Like many financially motivated groups, GOLD IONIC conducts indiscriminate, opportunistic attacks across geographies and sectors.

However, most victims are U.S.-based organizations, with a significant gap to the second-most impacted country, the UK. 

Geographic locations of victims posted to GOLD IONIC’s leak site (Source – Secureworks)

The prevalence of Western victims and lack of those from Commonwealth of Independent States countries suggests the group likely operates out of Russia or a CIS nation. 

No sector stands out, though industrial, healthcare, and education organizations are the most common targets, with educational establishments over-represented compared to other ransomware groups from August 2023 to March 2024.

Breakdown of sectors for victims posted to the GOLD IONIC leak site (Source – Secureworks)

In Secureworks’ incident response engagements, GOLD IONIC consistently deploys INC ransomware. One case potentially involved initial access via the “Citrix Bleed” vulnerability (CVE-2023-4966), an initial vector favored by LockBit affiliates. 

Post-intrusion, the attacker dropped a Meterpreter shell, enumerated Active Directory, archived and exfiltrated over 70GB of data using WinRAR and Megasync, then copied the victim-named INC ransomware binary to over 500 systems and executed it remotely via PsExec to encrypt files. 

The INC ransom note instructs contacting the threat actor within 72 hours via a “.onion” address to avoid data leaks.

While the leak site resembles LockBit’s, there are no other known connections between the groups.

Comparison of the LockBit (top) and INC Ransom (bottom) leak sites (Source – Secureworks)

The INC Ransom leak site lists some victims of other ransomware groups. One case involved files and a ransom note format matching ALPHV ransomware by GOLD BLAZER.

Donut Leaks warning about affiliates posting stolen data to other leak sites (Source – Secureworks)

Financially motivated affiliates may act in self-interest, even stealing data to post elsewhere with modified ransom contacts. 

Some affiliates have deployed up to seven ransomware families. While the dynamic affiliate-operator relationship could explain cross-posting on leak sites.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

PowerSchool Hacked – Attackers Accessed Personal Data of Students and Teachers

Walker County Schools has reported that unauthorized access to personal data belonging to students...