NoName ransomware gang deploying RansomHub malware in current assaults

The NoName ransomware gang has been making an attempt to construct a fame for greater than three years focusing on small and medium-sized companies worldwide with its encryptors and should now be working as a RansomHub affiliate.

The gang makes use of customized instruments often called the Spacecolon malware household, and deploys them after having access to a community by means of brute-force strategies in addition to exploiting older vulnerabilities like EternalBlue (CVE-2017-0144) or ZeroLogon (CVE-2020-1472).

In more moderen assaults NoName makes use of the ScRansom ransomware, which changed the Scarab encryptor. Moreover, the risk actor tried to make a reputation by experimenting with the leaked LockBit 3.0 ransomware builder, creating an identical knowledge leak website, and utilizing related ransom notes.

ScRansom ransomware

Cybersecurity firm ESET tracks the NoName gang as CosmicBeetle and has been monitoring its actions since 2023, with the emergence of the ScRansom, a Delphi-based file-encrypting  malware.

In a report as we speak, the researchers observe that though ScRansom (a part of the Spacecolon malware household) is just not as refined as different threats on the ransomware scene, it’s a risk that continues to evolve.

The malware helps partial encryption with completely different pace modes to permit attackers some versatility, and in addition options an ‘ERASE’ mode that replaces file contents with a relentless worth, making them unrecoverable.

ScRansom can encrypt information throughout all drives, together with mounted, distant, and detachable media, and permits the operator to find out what file extensions to focus on by means of a customizable record.

Earlier than launching the encryptor, ScRansom kills a listing of processes and companies on the Home windows host, together with Home windows Defender, the Quantity Shadow Copy, SVCHost, RDPclip, LSASS, and processes related to VMware instruments.

ESET notes that ScRansom’s encryption scheme is reasonably sophisticated, utilizing a combo of AES-CTR-128 and RSA-1024, and an additional AES key generated to guard the general public key.

ScRansom's encryption scheme
ScRansom’s encryption scheme
Supply: ESET

Nonetheless, the multi-step course of that includes a number of key exchanges generally introduces errors that will result in failure to decrypt the information even when utilizing the proper keys.

Additionally, if the ransomware is executed a second time on the identical system, or in a community of a number of distinct methods, new units of distinctive keys and sufferer IDs shall be generated, making the decryption course of reasonably complicated.

One case that ESET highlights is of a sufferer that obtained 31 decryption IDs and AES ProtectionKeys after paying ScRansom, and so they had been nonetheless unable to get well all of the encrypted information.

“This decryption approach is typical for an immature ransomware threat actor. Seasoned gangs prefer to have their decryption process as easy as possible to increase the chances of correct decryption, which boosts their reputation and increases the likelihood that victims will pay.” – ESET

NoName has been utilizing brute power to achieve entry to networks however the risk actor additionally exploits a number of vulnerabilities which can be extra more likely to be current in SMB environments:

    • CVE-2017-0144 (aka EternalBlue),
    • CVE-2023-27532 (a vulnerability in a Veeam Backup & Replication part)
    • CVE-2021-42278 and CVE-2021-42287 (AD privilege escalation vulnerabilities) by means of noPac
    • CVE-2022-42475 (a vulnerability in FortiOS SSL-VPN)
    • CVE-2020-1472 (aka Zerologon)

A current report from Pure7, a cybersecurity firm in Turkey, additionally mentions that CVE-2017-0290 has additionally been exploited in NoName assaults by means of a batch file (DEF1.bat) that makes adjustments in Home windows Registry to disable Home windows Defender options, companies, or duties.

NoName deploying RansomHub instruments

NoName’s ascension to the standing of RansomHub affiliate was preceded by a set of strikes displaying the gang’s dedication to the ransomware enterprise. Since ScRansom was not a longtime identify on the scene, the gang determined to take a unique method to extend its visibility.

In September 2023, CosmicBeetle arrange an extortion website on the darkish internet branded ‘NONAME,’ which was a modified copy of the LockBit knowledge leak website (DLS) that included victims really compromised by LockBit, not ScRansom, the researchers found after checking on a number of DLS-tracking companies.

The NONAME-branded portal
The NONAME-branded portal
Supply: ESET

In November 2023, the risk actor stepped up its impersonation effort by registering the area lockbitblog[.]information and branding the DLS with the LockBit theme and brand.

Clone LockBit 3.0 site by CosmicBeetle
Clone LockBit 3.0 website operated by CosmicBeetle
Supply: ESET

The researchers additionally found some current assaults the place a LockBit pattern was deployed however the ransom observe had a sufferer ID that they’d already linked to CosmicBeetle. Moreover, the toolset within the incident overlapped with the malware attributed to the CosmicBeetle/NoName risk actor.

“Using leaked builders is a common practice for immature ransomware gangs. It allows them to abuse the brand of their well-established competitors while also providing them with a ransomware sample that usually works properly” – ESET

Whereas investigating a ransomware incident that began in early June with a failed ScRansom deployment, ESET researchers discovered that the risk actor executed on the identical machine lower than per week later RansomHub’s EDR killer, a device that enables privilege escalation and disabling safety brokers by deploying a official, weak driver on focused units.

Two days later, on June 10, the hackers executed the RansomHub ransomware on the compromised machine.

The researchers observe the tactic for extracting the EDR killer, which was typical of CosmicBeetle and never a RansomHub affiliate.

Since there are not any public leaks of the RansomHub code or its builder, ESET researchers “believe with medium confidence that CosmicBeetle enrolled itself as a new RansomHub affiliate.”

Though the affiliation with RanssomHub is just not sure, ESET says that the ScRansom encrypter is below lively growth. Mixed with the swap from ScRansom to LockBit, it signifies that CosmicBeetle is just not displaying any indicators of giving up.

Recent articles