HomeCyber BalkansCosmicBeetle Utilizing Outdated Vulnerabilities To Target Small Businesses Globally

CosmicBeetle Utilizing Outdated Vulnerabilities To Target Small Businesses Globally

Published on

spot_img

The ransomware landscape has taken an intriguing turn with the emergence of CosmicBeetle, a threat actor that has recently swapped out its old ransomware, Scarab, in favor of a new custom-built ransomware called ScRansom. This new ransomware is continuously evolving, keeping cybersecurity experts on their toes.

CosmicBeetle has been actively targeting small and medium-sized businesses (SMBs) globally, employing tactics such as exploiting vulnerabilities to gain unauthorized access to their systems. Notably, the threat actor has been experimenting with the leaked LockBit builder, trying to capitalize on the reputation of the infamous ransomware gang by impersonating them.

Experts with medium confidence suggest that CosmicBeetle may be a new affiliate of RansomHub, a rising ransomware-as-a-service group. RansomHub is relatively new to the ransomware scene but has been making waves by actively targeting SMBs in Europe and Asia with its custom-developed ScRansom.

While ScRansom may not be the most sophisticated ransomware in terms of technical complexity, CosmicBeetle has managed to compromise several high-profile targets due to their unrefined approach and utilization of leaked LockBit tools. ESET telemetry and code analysis have provided strong indications that ScRansom is indeed a new tool developed by CosmicBeetle, with code similarities, overlapping deployments, and shared components pointing to the same conclusion.

Initial attribution to a Turkish software developer was deemed inaccurate, but further investigation revealed that the encryption scheme used in ScHackTool is likely based on an open-source algorithm, strengthening the link between ScRansom and CosmicBeetle. This solidifies the attribution and sheds light on the origins of this new ransomware variant.

CosmicBeetle has been predominantly targeting SMBs across various sectors using tactics like brute-force attacks and exploiting well-known vulnerabilities such as EternalBlue, CVE-2023-27532, AD privilege escalation vulnerabilities, FortiOS SSL-VPN vulnerability, and Zerologon. The group’s victims span a wide range of industries, including manufacturing, pharmaceuticals, legal, education, healthcare, technology, hospitality, financial services, and regional government.

Communication with victims is typically established through email and qTox, a messaging application, with the ransomware itself named NONAME. Interestingly, CosmicBeetle went to great lengths to impersonate the LockBit ransomware group by creating a fake LockBit leak site and using compromised victim data from LockBit. This further solidified their credibility, along with the inclusion of a Turkish ransom note with contact information in their ransomware samples.

ScRansom, the new ransomware developed by CosmicBeetle, employs a sophisticated encryption scheme involving AES and RSA keys to encrypt files across various drives. Victims are required to pay a ransom in exchange for a decryption key to recover their encrypted files. However, the decryption process can be complex and prone to failure due to multiple encryption sessions and potential file destruction.

Despite attempts to leverage the reputation of LockBit and the affiliations with RansomHub, ScRansom remains a complex and risky threat to victims. Ongoing research and analysis by cybersecurity experts will be crucial in understanding the full extent of this evolving ransomware threat and developing effective mitigation strategies.

Source link

Latest articles

CISA warns of vulnerability in BeyondTrust software being actively exploited (CVE-2024-12686)

BeyondTrust's Privileged Remote Access and Remote Support products have once again come under scrutiny...

The convergence of geopolitics and cybersecurity: Five predictions for 2025

In the world of cybersecurity, the landscape is ever-evolving with the advancement of AI...

Vulnerability Disclosure Policy Basics: Five Critical Components – Source: www.hackerone.com

Vulnerability disclosure and hacker-powered security have become increasingly important in today's digital landscape. The...

Top 10 Daily Cybercrime Brief by FCRF on 15.01.2025: Click here to Know More

In a recent cybercrime incident, a victim had Rs 1.25 lakh fraudulently withdrawn from...

More like this

CISA warns of vulnerability in BeyondTrust software being actively exploited (CVE-2024-12686)

BeyondTrust's Privileged Remote Access and Remote Support products have once again come under scrutiny...

The convergence of geopolitics and cybersecurity: Five predictions for 2025

In the world of cybersecurity, the landscape is ever-evolving with the advancement of AI...

Vulnerability Disclosure Policy Basics: Five Critical Components – Source: www.hackerone.com

Vulnerability disclosure and hacker-powered security have become increasingly important in today's digital landscape. The...