Monday, April 7, 2025
HomeComputer SecurityLazarus Hacking Groups Behind the Targeted VHD Ransomware Attacks

Lazarus Hacking Groups Behind the Targeted VHD Ransomware Attacks

Published on

SIEM as a Service

Follow Us on Google News

Lazarus hacker group is known for its attack on Sony Pictures in 2014, the group is financially motivated and know to be active since 2009.

The Lazarus Group believed to be operated by the North Korean government, the group is designated as an advanced persistent threat due to intended nature, threat, and a wide array of methods.

Starting from the year 2020, targeted ransomware attacks are on the rise, researchers discovered the recent ransomware strain, called VHD, associated with an unfamiliar source.

- Advertisement - Google News

APT Tactics with VHD Ransomware Attacks

Researchers observed a new ransomware campaign that uses APT groups spreading techniques deployed only in a limited number of instances.

Attackers use piggyback methods to spread the infection into the victim’s network and once they gain understanding about the target’s finances and IT structures they process the encryption.

Kaspersky researchers observed an incident in Europe that features the new ransomware family VHD and it uses written in C++ distributed APT group spreading technique.

The ransomware has nothing special, like other ransomware it “crawls all connected disks to encrypt files and delete any folder called System Volume Information. Also, it blocks process locking important files.”

The files are encrypted in the combination of AES-256 in ECB mode and RSA-2048 and it also includes a mechanism to resume ransomware if interested.

The ransomware also includes a spreading utility that propagates ransomware inside the network, the spreading utility contains a list of admin credentials that used to brute-force SMB service on every machine.

“Whenever a successful connection was made, a network share was mounted, and the VHD ransomware was copied and executed through WMI calls. This stood out to us as an uncharacteristic technique for cybercrime groups; instead, it reminded us of the APT campaigns Sony SPE, Shamoon and OlympicDestroyer, three previous wipers with worming capabilities.”

Researchers felt that attack did “not fit the usual modus operandi of known big-game hunting groups, also limited public samples found.”

In another incident, the attackers exploit a vulnerable VPN gateway that allows attackers to admin access and they deploy a backdoor to take over the Active Directory server and to deploy the ransomware.

“The data we have at our disposal tends to indicate that the VHD ransomware is not a commercial off-the-shelf product; and as far as we know, the Lazarus group is the sole owner of the MATA framework.”

IoC

SHA-256

6D12547772B57A6DA2B25D2188451983
D0806C9D8BCEA0BD47D80FA004744D7D
DD00A8610BB84B54E99AE8099DB1FC20
CCC6026ACF7EADADA9ADACCAB70CA4D6
EFD4A87E7C5DCBB64B7313A13B4B1012

The ransomware attacks now become an easy and malicious way of robbing individuals and company’s can cost billions of dollars not to mention the privacy and safety implications.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...