On August 29, 2024, The Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory on RansomHub ransomware [1]. RansomHub emerged in February 2024 and quickly gained notoriety as a Ransomware-as-a-Service (RaaS) group targeting critical infrastructure sectors. According to the FBI, RansomHub threat actors have impacted over 200 organizations in the last six months.
In this blog post, we explained the Tactics, Techniques, and Procedures (TTPs) used by RansomHub ransomware and how organizations can defend themselves against RansomHub ransomware attacks.
RansomHub Ransomware
RansomHub ransomware first appeared in February 2024 as a variant of Cyclops and Knight ransomware. Despite being relatively new, the group has rapidly gained notoriety in the ransomware scene after the FBI's disruption of ALPHV ransomware. Some security researchers speculate that RansomHub is the "spiritual successor" of ALPHV, leveraging former ALPHV affiliates and resources.
RansomHub predominantly targets critical infrastructure sectors such as healthcare, water management, financial services, government services, transportation, communication and emergency services. In their leak site, the group claims to be financially motivated. However, they also do not allow their affiliates to target CIS, Cuba, North Korea and China.
RansomHub threat actors employ common ransomware tactics such as gaining access via phishing, exploiting known vulnerabilities, and double extortion. After initial access, adversaries disable EDR tools and run reconnaissance in the compromised network. Afterward, they dump credentials or spray passwords to compromise valid accounts for lateral movement. Prior to encryption, RansomHub threat actors exfiltrate the victims' sensitive information and delete shadow volume copies. These actions prevent their victims from recovering their data and pressure them into paying ransom for the decryption key.
RansomHub Ransomware Analysis and MITRE ATT&CK TTPs
Initial Access
T1190 Exploit Public Facing Applications
RansomHub threat actors exploit known and critical vulnerabilities listed below to gain initial access to target organizations. Organizations are advised to patch their vulnerable assets as soon as possible.
Affected Product |
Vulnerability |
CVSS Score |
Citrix NetScaler ADC and NetScaler Gateway |
CVE-2023-3519 |
9.8 (Critical) |
Fortinet FortiOS and FortiProxy SSL-VPN |
CVE-2023-27997 |
9.8 (Critical) |
Java OpenWire |
CVE-2023-46604 |
9.8 (Critical) |
Atlassian Confluence Data Center and Server |
CVE-2023-22515 |
9.8 (Critical) |
F5 BIG-IP |
CVE-2023-46747 |
9.8 (Critical) |
Fortinet FortiClientEMS |
CVE-2023-48788 |
9.8 (Critical) |
Microsoft Netlogon |
CVE-2020-1472 |
10.0 (Critical) |
Microsoft Windows BITS |
CVE-2020-0787 |
7.8 (High) |
Microsoft SMBv1 |
CVE-2017-0144 |
8.8 (High) |
T1566 Phishing
RansomHub group uses mass phishing and spear-phishing emails to gain initial access to target networks.
Execution
T1047 Windows Management Instrumentation
Adversaries use Windows Management Instrumentation to disable antivirus products. Additionally, they use the following command to delete volume shadow copies to prevent their victims from recovering their files.
wmic.exe shadowcopy delete |
T1059.001 Command and Scripting Interpreter: PowerShell
RansomHub threat actors use PowerShell-based living off-the-land methods to run network scanning. Adversaries also use the following PowerShell command to shut down virtual machines so the encryption process would not be interrupted by active services.
powershell.exe -Command PowerShell -Command ""Get-VM | Stop-VM -Force"" |
Persistence & Privilege Escalation
T1136 Create Account & T1098 Account Manipulation
Adversaries create new accounts or re-enable disabled accounts to establish persistent access to the compromised network. The re-enabled account may also allow them to escalate their privileges.
Defense Evasion
T1036 Masquerading
RansomHub operators rename their ransomware payload with seemingly benign names such as Windows.exe, and place them either on the victim's desktop or downloads directory.
T1070 Indicator Removal on Host
Adversaries delete Windows and Linux system logs on the compromised hosts to slow down or prevent incident response efforts.
T1562.001 Impair Defenses: Disable or Modify Tools
RansomHub uses the EDRKillShifter and Bring-your-own-Vulnerable-Driver (BYOVD) techniques to disarm endpoint detection and response (EDR) tools.
Credential Access
T1003 OS Credential Dumping
RansomHub threat actors use Mimikatz on Windows systems to dump credentials.
T1110.003 Brute Force: Password Spraying
RansomHub operators use password spraying to gain initial access to the target systems.
Discovery
T1018 Remote System Discovery & T1046 Network Service Discovery
Adversaries use publicly available tools such as nmap and AngryIPScanner to run reconnaissance in the compromised network for remote system and network services.
Lateral Movement
T1210 Exploitation of Remote Services
RansomHub threat actors exploit the CVE-2017-0144 vulnerability and SMBExec tool to gain unauthorized access to remote systems. Adversaries also use PsExec and Remote Desktop Protocol (RDP) for lateral movement.
Command and Control (C2)
T1219 Remote Access Software
RansomHub operators use known tools such as AnyDesk, Cobalt Strike, Connectwise, N-Able, and Sliver to interact with compromised systems and communicate with their C2 servers.
Exfiltration
T1048 Exfiltration Over Alternative Protocol
Adversaries use PuTTY, WinSCP, and rclone to exfiltrate their victims' sensitive data for double extortion.
T1537 Transfer Data to Cloud Account
RansomHub operators use misconfigured Amazon S3 instances to access and exfiltrate backups, expanding the scope of extortion.
Impact
T1486 Data Encrypted for Impact
RansomHub ransomware uses the Curve 25519 and AES algorithms in combination to encrypt their victims' sensitive files. Prior to encryption, adversaries try to kill active processes so that the encryption process would not be interrupted by them.
The ransomware payload follows an intermittent encryption method based on the size of the file. Files smaller than 0x100000 bytes are completely encrypted and appended with 0x3A bytes of data. If the data is larger than 0x100000 bytes, the payload encrypts files in 0x100000 byte chunks and skips every 0x200000 bytes of data in between encrypted chunks.
The encrypted files are appended with a ransom file extension.
T1490 Inhibit System Recovery
Adversaries use Volume Shadow Service Admin (vssadmin) and Windows Management Instrumentation (WMI) to delete volume shadow copies and prevent their victims from recovering their encrypted files.
vssadmin delete shadows /all /quiet wmic.exe shadowcopy delete |
How Picus Helps Simulate RansomHub Ransomware Attacks?
We also strongly suggest simulating RansomHub ransomware attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Security Validation Platform. You can also test your defenses against hundreds of other ransomware variants, such as Akira, Black Basta, and Phobos, within minutes with a 14-day free trial of the Picus Platform.
Picus Threat Library includes the following threats for RansomHub ransomware:
Threat ID |
Threat Name |
Attack Module |
24872 |
RansomHub Ransomware Campaign 2024 |
Windows Endpoint |
72426 |
RansomHub Ransomware Download Threat |
Network Infiltration |
55745 |
RansomHub Ransomware Email Threat |
Email Infiltration (Phishing) |
Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address RansomHub ransomware and other ransomware attacks in preventive security controls. Currently, Picus Labs validated the following signatures for RansomHub ransomware:
Security Control |
Signature ID |
Signature Name |
Check Point NGFW |
08767A86B |
Ransomware.Win32.Knight.TC.7491RdOu |
Check Point NGFW |
0C1AA225A |
Ransomware.Win32.Knight.TC.68c8NMKB |
Check Point NGFW |
0E8CC7B70 |
Ransomware.Win32.Knight.TC.a851BbyQ |
Check Point NGFW |
0854E605E |
Ransomware.Win32.Knight.TC.0afepFqN |
Cisco FirePower |
RansomX:Artemis.27ff.in14.Talos |
|
Cisco FirePower |
W32.8F59B4F0F5-95.SBX.TG |
|
Cisco FirePower |
W32.Variant:Attribute.27fm.1201 |
|
Forcepoint NGFW |
|
File_Malware-Blocked |
Fortigate AV |
10175747 |
W32/Filecoder_Knight.D!tr |
Palo Alto |
648798921 |
Trojan/Win64.splinter.bx |
Palo Alto |
648798918 |
Trojan/Win64.splinter.bw |
Palo Alto |
641803191 |
trojan/Win32.tedy.fjz |
Palo Alto |
648798906 |
Trojan/Win64.splinter.bv |
Start simulating emerging threats today and get actionable mitigation insights with a 14-day free trial of the Picus Security Validation Platform.
References
[1] "#StopRansomware: RansomHub Ransomware," Cybersecurity and Infrastructure Security Agency CISA. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a. [Accessed: August 29, 2024]