Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well.
Numerous use Cobalt Strike for remote access, employ RDP brute force, and target Domain Controller servers to control network machines.
Cybersecurity researchers at Sophos X-Ops recently reported their investigation on ransomware attacks from Jan 2023 publicly, under which they examined four ransomware attacks.
They investigated the following attacks:-
In these attacks, the most shocking thing that researchers unveiled publicly is they found several similarities in the attack pattern of these ransomware groups.
Here below we have mentioned all the patterns of behavior that are observed by the security analysts at Sophos MDR:-
What caught Sophos MDR’s attention was the inclusion of Royal ransomware in the attack cluster, a group known for exclusivity, avoiding outside “affiliate” attackers.
A cluster doesn’t guarantee attribution, but in some scenarios, it could do the same with strong evidence. Shared behaviors don’t confirm the same attackers, but suggest a similar playbook, as Kroll Inc. analysis shows a fifth attack aligns with this cluster.
Here below we have mentioned the same batch scripts and files that are used:-
Threat actors use the Scheduled Tasks for the creation of persistence methods, and they name the tasks with the following types of names:-
API Attacks Have Increased by 400% – Understand the Fundamentals of Protecting Your APIs with a Positive Security Model – Register Now for a Free Webinar
Common tools and techniques used:-
Logs from the Hive ransomware attack earlier this year against a target with a different endpoint security product revealed the first signs of the threat cluster behavior.
Examining these attacks reveals both similarities and key differences; however, the initial access methods differ, possibly due to Royal buying access from distinct Initial Access Brokers.
Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National…
In a joint cybersecurity advisory, the FBI, CISA, NSA, and partner agencies from Canada, the…
A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers…
In a decisive move to bolster cloud security, the Cybersecurity and Infrastructure Security Agency (CISA)…
Fortinet, a global leader in cybersecurity solutions, has issued an urgent security advisory addressing two…
Google has released a new security update on the Stable channel, bringing Chrome to version 131.0.6778.204/.205…