RansomHub Ransomware: Emerging Threat and Mitigation Strategies

RansomHub ransomware has quickly gained notoriety since its inception in February 2024. The advisory disseminates known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with RansomHub

RansomHub Ransomware: Emerging Threat and Mitigation Strategies
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

Introduction

On August 29, 2024, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing and Analysis Center (MS-ISAC), and Department of Health and Human Services (HHS) released a joint cybersecurity advisory. The advisory, part of the ongoing #StopRansomware campaign, highlights the RansomHub ransomware. This variant has quickly gained notoriety since its inception in February 2024. The advisory disseminates known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with RansomHub, urging network defenders to implement critical mitigations to reduce the risk of infection.

Report Overview

RansomHub, known initially as Cyclops and Knight, is a ransomware-as-a-service (RaaS) model that has attracted high-profile affiliates from other prominent ransomware families, such as LockBit and ALPHV. Since its emergence, RansomHub has been responsible for encrypting and exfiltrating data from at least 210 victims across various critical infrastructure sectors, including water and wastewater, healthcare, government services, and financial services.

The RansomHub affiliates typically gain initial access through various means, including phishing emails, exploitation of known vulnerabilities, and password-spraying techniques. Vulnerabilities such as CVE-2023-3519 in Citrix ADC and CVE-2023-27997 in FortiOS have been exploited to achieve remote code execution and unauthorized access to target systems.

Once inside the network, affiliates employ tools like AngryIPScanner, Nmap, and PowerShell-based methods to discover networks. They then escalate privileges using tools like Mimikatz and move laterally through the network using Remote Desktop Protocol (RDP) and PsExec. Data exfiltration is conducted through various means, including HTTP POST requests, Amazon AWS S3 buckets, and tools like WinSCP and Rclone.

The ransomware leverages the Curve 25519 encryption algorithm, implementing intermittent encryption to encrypt large files efficiently. Ransom notes typically instruct victims to contact the ransomware group via a unique .onion URL, with ransom demands varying depending on the affiliate responsible for the attack.

RansomHub has significantly affected its victims, particularly in critical infrastructure sectors. Affiliates' double-extortion model—encrypting systems and exfiltrating data—has resulted in severe operational disruptions and financial losses for affected organizations. The broad range of sectors RansomHub targets highlights its potential to cause widespread damage, making it a critical threat to national security and economic stability.

Insights and Analysis

The FBI and CISA emphasize that organizations should not pay ransoms, as doing so does not guarantee file recovery and may encourage further criminal activity. Instead, they recommend a series of mitigation measures, including implementing phishing-resistant multi-factor authentication (MFA), keeping systems updated, and segmenting networks to limit the spread of ransomware.

RansomHub represents a significant and evolving threat in the cybersecurity landscape. Organizations must remain vigilant and proactive in implementing the recommended mitigations to protect against this and other ransomware variants. By following the guidance in the advisory and maintaining a robust cybersecurity posture, organizations can reduce their risk of falling victim to RansomHub and similar threats.

Network defenders are encouraged to review the complete advisory, which is available on the # StopRansomware website, for further details and technical information, including a full list of IOCs and TTPs.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
8.211.2[.]97IP AddressKnown IP address linked to malicious activity, historically associated with QakBot.
45.95.67[.]41IP AddressKnown IP address linked to RansomHub ransomware operations.
45.134.140[.]69IP AddressKnown IP address related to malicious activity.
45.135.232[.]2IP AddressKnown IP address associated with RansomHub-related activities.
89.23.96[.]203IP AddressKnown IP address involved in distributing ransomware payloads.
188.34.188[.]7IP AddressKnown IP address linked to RansomHub ransomware operations.
193.106.175[.]107IP AddressIP address related to RansomHub activity.
193.124.125[.]78IP AddressIP address associated with RansomHub or similar ransomware activities.
193.233.254[.]21IP AddressIP address used in RansomHub-related malicious activities.
C:\Users%USERNAME%\AppData\Local\Programs\Python\Python311\Scripts\crackmapexec.exeFile PathPath indicating the presence of CrackMapExec tool, used in network compromises.
C:\Users%USERNAME%\AppData\Local\Programs\Python\Python311\Scripts\kerbrute.exeFile PathPath indicating the use of Kerbrute for Kerberoasting attacks.
C:\Users%USERNAME%\Downloads\Anydesk.exeFile PathPath indicating the use of Anydesk for command and control (C2) purposes.
C:\Users%USERNAME%\Desktop\IamBatMan.exeFile PathPath indicating the presence of a ransomware executable.
C:\Users\backupexec\Desktop\stealer_cli_v2.exeFile PathPath indicating the presence of an information stealer.
C:\Users%USERNAME%\Downloads\nmap-7.94-setup.exeFile PathPath indicating the use of Nmap for network scanning during the attack.
C:\Program Files (x86)\Nmap\nmap.exeFile PathPath indicating the installation of Nmap, likely used for network discovery.
C:\Users%USERNAME%\Downloads\mimikatz_trunk\x64\mimikatz.exeFile PathPath indicating the use of Mimikatz for credential dumping.
C:\Users\backupexec\Downloads\x64\mimikatz.exeFile PathPath indicating another instance of Mimikatz used for credential theft.
http[:]//188.34.188[.]7/555URLMalicious URL linked to ransomware operations, possibly used for C2 or payload delivery.
http[:]//188.34.188[.]7/555/amba16.icoURLMalicious URL associated with RansomHub, possibly serving malicious files.
http[:]//89.23.96[.]203/333/1.exeURLURL linked to ransomware payload distribution.
http[:]//89.23.96[.]203/333/bcrypt.dllURLURL distributing malicious DLL files associated with ransomware.
brahma2023[@]onionmail.orgEmail Address

Full list can be found the CISA website below.

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Initial AccessPhishingT1566RansomHub affiliates used phishing emails to gain initial access to target systems.
Initial AccessExploit Public-Facing ApplicationT1190Exploitation of known vulnerabilities in Citrix ADC and FortiOS to gain unauthorized access.
ExecutionCommand and Scripting InterpreterT1059.001Use of PowerShell scripts to automate and execute malicious commands within compromised networks.
Defense EvasionMasqueradingT1036Renaming of ransomware executables to innocuous file names to evade detection.
Credential AccessOS Credential DumpingT1003Use of Mimikatz to dump credentials from compromised Windows systems.
Lateral MovementRemote Desktop ProtocolT1021.001Use of Remote Desktop Protocol (RDP) to move laterally within the network after gaining access.
ExfiltrationExfiltration Over Alternative ProtocolT1048.002Data exfiltration through asymmetrically encrypted non-C2 protocols, such as HTTP POST requests.
ImpactData Encrypted for ImpactT1486RansomHub affiliates encrypted files using Curve 25519, impacting data availability.
ImpactInhibit System RecoveryT1490Deletion of volume shadow copies and backups to prevent system recovery after encryption.

References

#StopRansomware: RansomHub Ransomware | CISA