HomeCyber BalkansThe RA Group, a new ransomware gang, is rapidly expanding its operations.

The RA Group, a new ransomware gang, is rapidly expanding its operations.

Published on

spot_img

A new ransomware group called RA Group has emerged recently, warning companies of their new method that engages in data theft and extortion. The group operates a data leak site and threatens to publish stolen data publicly if a victim fails to contact them within a specified time period or does not meet their specific ransom demands. The group’s ransomware program was built from the leaked source code of Babuk, another threat that emerged in late September 2021.

Researchers from Cisco Talos, who analyzed the ransomware sample, have not yet determined how attackers are gaining initial access to these networks. However, they suggest that it may be through vulnerabilities in publicly exposed systems, stolen remote access credentials, or by buying access from a different cybercrime gang that distributes malware. Once initial access is obtained, the attackers engage in lateral movement and deploy other malware tools in an attempt to exfiltrate potentially valuable and sensitive data from these companies.

Talos found that the final ransom note dropped by the RA Group is tailored for each individual victim, refers to them by name, lists specific data that was copied, and warns of publicly leaking it within three days if a ransom payment is not made. The group’s data leak site, hosted on a Tor server, was launched on April 22 and had already listed four victims by the end of the month. It included their names, links to their websites, and a summary of the available data that was also made available for sale to others.

The ransomware binary analyzed by Talos was compiled on April 23 and written in C++, with a debug path that’s consistent with paths found in Babuk. Babuk used AES-256-CTR with the ChaCha8 cipher for file encryption, but RA Group uses a different approach. It uses the WinAPI CryptGenRandom function to generate cryptographically random bytes that are used as a private key for each victim and is then used in a crypto scheme that uses curve25519 and eSTREAM cipher hc-128. Files are only partially encrypted to speed up the process and are renamed to the extension .GAGUP.

The ransomware program has a list of folders and files that it will not encrypt to avoid system crashes. However, it will check the network for writable file shares and attempt to encrypt files stored on them. It will also empty the system recycle bin and use the vssadmin.exe tool to delete volume shadow copies that could be used to recover files.

According to Talos, the RA Group has already compromised three US-based organizations and one from South Korea, covering business verticals such as manufacturing, wealth management, insurance providers, and pharmaceuticals. The group’s data leak site has already begun to leak stolen data and threatens to do so at a remarkably fast rate.

The escalating threat of ransomware is a major concern for organizations worldwide. With ransomware groups adopting such tactics as gathering and selling stolen data, companies must take strong action to ensure their defenses are up to date and continually monitored. The RA Group’s ability to tailor its attack to each victim shows the depth of effort these groups put into their attacks. Therefore, organizations must ensure they take proactive measures to guard against these threats. It is vital that organizations practice good cybersecurity hygiene by keeping software systems up to date, using strong passwords, and conducting security awareness training for their employees.

In summary, the RA Group is the latest ransomware group to emerge, using Babuk’s leaked source code to compromise organizations worldwide. Their method involves not only encrypting but also stealing data and threatening to publish it if the ransom demands are not met. It is more imperative than ever that organizations acknowledge the growing threat of ransomware and take the necessary steps to defend themselves against such attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...