Threat actors have been utilizing hacked domain controls to host malicious content, effectively evading detection by security measures. By leveraging legitimate domains, these cybercriminals can operate under the radar and bypass antivirus software and tools designed to detect and mitigate malicious activities.
The use of anti-AV tactics further enhances the stealth and effectiveness of cyberattacks, enabling threat actors to compromise systems and steal sensitive information with ease. Recently, cybersecurity researchers at Trend Micro uncovered a new threat known as RA World ransomware, which has been targeting Windows systems using hacked domains and sophisticated Anti-AV techniques.
The RA World ransomware, formerly known as the RA Group, began its malicious activities in April 2023, infiltrating global organizations. While the main targets of this ransomware group are US firms, it has also been observed attacking healthcare, insurance, and financial businesses. The attackers behind RA World utilized compromised domain controllers to drop malicious components into Group Policy Objects (GPO), allowing them to execute their nefarious activities undetected.
The malware deployed in these attacks, such as Stage1.exe, leverages altered Group Policy settings to execute malicious scripts on multiple machines within the targeted domain. By scanning for specific conditions and dropping additional components like Stage2.exe and Finish.exe, the ransomware follows a multi-stage approach to compromise the network effectively.
Beyond the initial stages of infection, the RA World ransomware progresses to deploy Stage3.exe, the ransomware payload, and creates a mutex through Finish.exe. The ransom note left behind by the attackers includes a list of recent victims, demonstrating the extortion tactics used to demand payment for decryption keys.
To further evade detection and hinder recovery efforts, RA World wipes out the Trend Micro folder using SD.bat and removes Safe Mode with Networking options, forcibly rebooting the compromised system. This aggressive approach to cyber extortion highlights the evolution of ransomware threats, fueled by leaked source code from previous ransomware families like Babuk.
In response to these escalating threats, cybersecurity experts recommend implementing several proactive measures to mitigate the risk of ransomware attacks. Limiting administrative rights, keeping security products up to date, and regularly backing up essential data are crucial steps in enhancing cybersecurity posture. Furthermore, educating users on social engineering risks, exercising caution with emails and attachments, and encouraging prompt reporting of suspicious activities are essential in combating ransomware threats.
By staying informed about the latest cybersecurity developments and following best practices for network security and threat mitigation, organizations can effectively defend against emerging threats like the RA World ransomware. Collaborative efforts within the cybersecurity community are essential in combating cybercriminals and protecting critical infrastructure from ransomware attacks.

