HomeCII/OTNorth Korea's Andariel Begins Using 'Play' Ransomware

North Korea’s Andariel Begins Using ‘Play’ Ransomware

Published on

spot_img

In a recent development, one of North Korea’s renowned state-sponsored threat groups has shifted its focus to utilizing Play ransomware in its attacks, marking the first instance of collaboration with an underground ransomware network. This move has raised concerns among researchers as it paves the way for potentially high-impact cyber attacks in the future.

Andariel, previously associated with a ransomware strain called “Maui”, has now been identified by Palo Alto Networks’ Unit 42 as partnering with the Play ransomware gang. However, the exact nature of this collaboration – whether Andariel is acting as an initial access broker (IAB) or as an affiliate of the ransomware group – remains unclear. The researchers observed that Andariel is responsible for a recent Play ransomware attack where the attackers gained initial access to the network through a compromised user account several months prior to deploying the ransomware payload in September.

The involvement of Andariel in Play ransomware attacks indicates a significant shift in tactics and procedures, signaling deeper engagement in the ransomware threat landscape. This development could potentially lead to a trend where North Korean threat groups increasingly participate in broader ransomware campaigns, resulting in more widespread and damaging attacks on a global scale.

Play ransomware, managed and deployed by a group known as Fiddling Scorpius, gained notoriety after targeting the city of Oakland, California with a crippling attack earlier this year. Some experts speculate that Fiddling Scorpius has transitioned from conducting its own attacks to adopting a ransomware-as-a-service (RaaS) model, although the group has denied this claim on its ransomware leak site. This shift suggests that Andariel likely acted as an IAB in the recent attack rather than as an affiliate.

Several indicators in the attack sequence point to collaboration between Andariel and the Play ransomware group. The compromised account used for initial access and lateral movement in the network was also leveraged for deploying Andariel’s tools before initiating the ransomware attack. Additionally, command-and-control communication with the Silver malware was observed prior to the deployment of Play ransomware, further highlighting the coordination between the two groups.

Andariel, under the control of North Korea’s Reconnaissance General Bureau, has a history of targeting critical sectors such as defense, aerospace, nuclear, and engineering companies, as well as managed service providers worldwide. The group’s malicious activities have attracted the attention of international law enforcement agencies, including the US National Security Agency (NSA), which views Andariel as an ongoing threat to various industry sectors in countries like the US, South Korea, Japan, and India. The US Department of State’s Rewards for Justice program has even offered a reward of up to $10 million for information leading to the apprehension of key figures within Andariel.

In response to the escalating threat posed by North Korean ransomware groups, Unit 42 has provided a list of indicators of compromise (IoCs) in its report. The researchers recommend that organizations enhance their defenses by leveraging the latest threat intelligence, employing advanced URL filtering, and implementing robust DNS security solutions to detect and mitigate malicious activity associated with Andariel and Play ransomware. This proactive approach is crucial in safeguarding against the growing menace of state-sponsored ransomware attacks on a global scale.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...