RansomHub Revealed: Threats, Tools, and Tactics

December 9, 2024

RansomHub, a ransomware group operated by threat actors such as Notchy, RansomHUB Team, SCATTERED SPIDER, and Water Bakunawa, emerged in early 2024, as a formidable player in the cybercrime ecosystem. Operating under the Ransomware-as-a-Service (RaaS) model, RansomHub provides its sophisticated ransomware tools to affiliates, including prominent operators from rival groups such as LockBit and ALPHV. Believed to be a rebranded version of the Knight/Cyclops ransomware, RansomHub employs double extortion tactics, encrypting and exfiltrating data to pressure victims into paying hefty ransoms.  

What sets RansomHub apart is its sophisticated targeting across multiple platforms, including Windows, Linux, ESXi, NAS, and SFTP servers, making it an adaptable and formidable adversary. Since February 2024, the group has claimed more than 200 victims, causing both operational disruption and reputational damage for its victims. Its audacity and efficiency have earned it the title of the most active ransomware operation, cementing its status as a dominant player in the ever-escalating ransomware landscape.  

Overview of the RansomHub profile

Recent Activity

Bologna FC, an Italian professional football club, has reportedly fallen victim to a ransomware attack orchestrated by the RansomHub cybercrime group. According to the gang's postings on the dark web, the club declined to meet ransom demands despite being granted an extension to negotiate. This refusal led to the attackers publishing the entire stolen data set online.  

To exert additional pressure, the threat actors cited potential penalties under GDPR, implying that the leaked data could result in significant fines for the club. This coercion tactic, often employed in ransomware attacks, aims to exploit regulatory consequences to compel victims into compliance.

Technical Details

Initial access

RansomHub affiliates typically compromise internet facing systems and user endpoints by using methods such as phishing emails, exploitation of known vulnerabilities and password spraying. {utm hyperlinks to the cve’s to be given)

Observed Exploited CVE’s by Ransomhub ransomware to gain initial access:

CVE-ID Affected Vendor Description about the Vulnerability
CVE-2023-48788 Fortinet SQL Injection vulnerability in the Fortinet FortiClientEMS that can enable an unauthenticated attacker to execute code via specially crafted packets.
CVE-2023-46747 F5 BIG-IP System Authentication bypass vulnerability that allows an attacker with network access to execute arbitrary system commands.
CVE-2023-46604 Apache ActiveMQ A deserialization of untrusted data vulnerability that can lead to remote code execution.
CVE-2023-3519 Citrix An unauthenticated remote code execution vulnerability in the Citrix ADC and Citrix gateway.
CVE-2023-27997 Fortinet Heap-based buffer overflow vulnerability that may allow remote attackers to execute arbitrary commands via specially crafted requests.
CVE-2023-22515 Atlassian Broken access control vulnerability in the Confluence Data center and Server leads to privilege escalation.
CVE-2020-1472 Microsoft An elevation of privilege vulnerability occurs when an attacker exploits a weakness in the Netlogon Remote Protocol (MS-NRPC) to establish a vulnerable secure channel connection with a domain controller.
CVE-2020-0787 Microsoft Elevation of Privilege vulnerability in the Background Intelligent Transfer Service (BITS).
CVE-2020-0144 Microsoft Remote Code execution vulnerability in the Windows SMB.

Execution

Attackers leveraged Windows Management Instrumentation (WMI) to disable antivirus programs, ensuring minimal resistance from security tools during the attack.  

Persistence and Privilege escalation  

RansomHub affiliates take deliberate steps to establish persistence within the network. They create new user accounts, re-enable previously disabled accounts and escalate their privileges to SYSTEM level, ensuring continued control and further access. These actions allow them to maintain a foothold and execute their attack without being easily detected and disrupted.

Defense Evasion
Attackers strategically rename the ransomware executable to inconspicuous file names like Windows.exe and leave it in common directories such as the user's desktop or downloads folder, mimicking legitimate files. To further obscure their activities, affiliates systematically clear Windows and Linux system logs, effectively erasing traces of their actions.  

Additionally in some cases, RansomHub-specific utilities were leveraged to disable advanced Endpoint Detection and Response (EDR) solutions, highlighting the group's focus on neutralizing defensive mechanisms before launching their payload.  

Credential Access

RansomHub escalates its attack by using Task Manager to extract credentials from the Local Security Authority Subsystem Service (LSASS) memory. This technique enables the ransomware to obtain sensitive authentication details, facilitating deeper access to the network and increasing the potential for widespread damage. By gaining control over these critical credentials, RansomHub not only amplifies its ability to launch further attacks but also significantly complicates the victim’s efforts to recover and mitigate the breach.

Discovery

Ransomhub affiliates conduct network scanning with tools such as AngryIPScanner, Nmap to conduct network scanning. RansomHub intensifies its attack strategy by deploying the NetScan tool, which helps to identify machines across the network and map out various endpoints. This approach enables the group to create a detailed map of the victim’s infrastructure, laying the foundation for more targeted and devastating attacks.  

Lateral Movement

Attackers used the Lateral Tool Transfer technique to covertly move malicious tools between systems, avoiding detection while expanding their control. Once on the network, RansomHub exploits SMB (Server Message Block) and Windows Admin Shares to remotely execute commands. These protocols enable attackers to remotely manipulate systems, ensuring continued access and propagation across devices.

Command and Control

RansomHub affiliates may leverage AnyDesk, a legitimate remote desktop support tool, to establish an interactive command-and-control (C2) channel. By using this widely trusted software, they can remotely access, and control compromised systems within the target network, making their activities more difficult to detect.  

Data Exfiltration  

RansomHub affiliates employ various methods for data exfiltration, often depending on the specific affiliate conducting the network compromise. The ransomware binary itself typically lacks an in-built data exfiltration mechanism. Instead, affiliates rely on external tools and techniques to extract sensitive data.  

Observed methods for data exfiltration include:

Encryption

The ransomware also targets system recovery efforts by deleting all Volume Shadow Copy Service (VSS) snapshots through the vssadmin.exe tool, preventing file restoration.  

Ransom Note

A ransom note titled "How To Restore Your Files.txt" is left on compromised systems, providing instructions for the victim. The ransom note assigns victims a unique client ID and directs them to communicate with the group through a dedicated .onion URL, accessible via the Tor browser. Victims are typically given a timeframe of three to 90 days (based on the affiliate's preferences) to pay the ransom. If the payment is not made within this period, the group threatens to expose the stolen data on the RansomHub Tor data leak site, further pressuring victims into compliance.

Ransom note of RansomHub Source: Tripwire

Tools leveraged by the Ransomhub affiliates

Tool Name Description Usage
BITSAdmin A command-line tool that facilitates asynchronous file transfers between a client and server, leveraging the Background Intelligent Transfer Service (BITS) for efficient and reliable data handling. Used for managing file transfers between compromised systems and C2 servers.
Cobalt Strike A penetration testing tool used to simulate advanced cyberattacks for security testing. Employed by RansomHub affiliates for lateral movement and executing malicious files.
Mimikatz A tool that enables users to view and save authentication credentials. Used for privilege escalation by stealing credentials to gain higher access.
PSExec A tool designed to run programs and execute commands on remote systems. Utilized to execute commands remotely across the network.

MITRE ATT&CK Tactics and Techniques

ID Technique Comments
T1588.005 Obtain Capabilities: Exploits Ransomhub gathered the exploits that were used to target specific vulnerabilities.
T1566.001 Phishing: Spearphishing Attachment RansomHub ransomware operators often initiate attacks by sending spear phishing emails containing malicious attachments.
T1190 Exploit Public-facing Application Ransomhub affiliates leveraged known vulnerabilities to gain initial access.
T1059.001 Command and Scripting Interpreter: PowerShell RansomHub threat actors abused PowerShell commands and scripts for execution. Examples include the Start-Process cmdlet which is used to run an executable and the Invoke-Command cmdlet which runs a command locally or on a remote computer.
T1047 Windows Management Instrumentation Ransomhub affiliates abused Windows Management Instrumentation to execute malicious commands and payloads.
T1136.001 Create Account: Local Account RansomHub affiliates created a local account to maintain access to victim systems.
T1098 Account Manipulation RansomHub affiliates engaged in account manipulation by modifying the adversaries' access to a compromised account.
T1021.001 Remote Services: Remote Desktop Protocol RansomHub affiliates logged onto systems using Remote Desktop Protocol and performed actions as the logged-on user.
T1036.008 Masquerading: Masquerade File Type RansomHub affiliates masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, and contents.
T1070.001 Indicator Removal: Clear Windows Event Logs Ransomhub affiliates clear Windows Event Logs to hide the activity of an intrusion.
T1562.001 Impair Defenses: Disable or Modify Tools RansomHub affiliates disable endpoint detection and response (EDR) tooling to avoid detection.
T1110.003 Brute Force: Password Spraying RansomHub affiliates use the password spraying technique to achieve initial access.
T1003.001 OS Credential Dumping: LSASS Memory RansomHub affiliates accessed credentials from the material stored in the process memory of the Local Security Authority Subsystem Service (LSASS).
T1018 Remote System Discovery Ransomhub affiliates identified and listed out all the systems used for Lateral Movement.
T1046 Network Service Discovery Ransomhub affiliates obtained a list of services running on remote hosts.
T1210 Exploitation of Remote Services Ransomhub affiliates exploited remote services to gain unauthorized access to internal systems.
T1219 Remote Access Software Ransomhub affiliates used legitimate desktop support and remote access software to establish an interactive command control channel to target systems within networks.
T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol Ransomhub threat actors had stolen data by exfiltrating it over an asymmetrically encrypted network protocol, distinct from the established command and control channel.
T1537 Transfer Data to Cloud Account RansomHub affiliates exfiltrated data by transferring and creating backups of cloud environments.
T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Unencrypted Non-C2 Protocol RansomHub affiliates had stolen data by exfiltrating it over an unencrypted network protocol, different from the established command and control channel.
T1486 Data Encrypted for Impact RansomHub affiliates encrypted data on the target systems in a network to interrupt availability to system and network resources.
T1490 Inhibit System Recovery RansomHub affiliates disabled built-in data restoration tools and recovery services to obstruct efforts aimed at restoring corrupted systems.

Mitigation

  1. Data Protection and Recovery - Implement a recovery plan ensuring multiple copies of sensitive or proprietary data and servers are maintained and stored in secure, physically separate, and segmented locations (e.g., hard drives, storage devices, or cloud solutions).
  1. Password Management and Policy - Require all accounts with password logins (e.g., service, admin, and domain admin accounts) to follow NIST standards for password policy management.  
  1. Patch Management - Maintain up-to-date operating systems, applications, and firmware. Prioritize patching known exploited vulnerabilities, especially on internet-facing systems.
  1. Network Segmentation - Segment networks to restrict lateral movement and control traffic flows between subnetworks. Limit access to sensitive systems and enforce strict traffic policies.
  1. Multi-Factor Authentication (MFA) - Require phishing-resistant MFA for administrator accounts. Deploy standard MFA for all services, focusing on critical systems like webmail, VPNs, and privileged accounts.
  1. Endpoint and Network Monitoring - Use tools like EDR (Endpoint Detection and Response) to detect abnormal activity and lateral movement. Implement network monitoring solutions to log and report all traffic, including suspicious connections.  
  1. Application Control and Privilege Management - Require administrator credentials for software installation. Enforce least privilege policies to minimize unnecessary access rights.
  1. Anti-Phishing Measures - Train employees to identify and report phishing attempts. Deploy email filtering solutions to reduce phishing emails.
  1. Incident Response Preparation - Develop and test an incident response plan. Ensure clear communication protocols and designated roles for handling cyber incidents.
  1. Ransomware-Specific Measures - Block execution of unauthorized files through application whitelisting. Disable unused ports and services to reduce attack vectors.

References Cited:

  1. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a
  2. https://www.csk.gov.in/alerts/RansomHub_Ransomware.html
  3. https://www.trendmicro.com/en_in/research/24/i/how-ransomhub-ransomware-uses-edrkillshifter-to-disable-edr-and-.html
  4. https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/what-is-ransomhub-ransomware/
  5. https://www.infosecurity-magazine.com/news/ransomhub-overtakes-lockbit/
  6. https://www.tripwire.com/state-of-security/ransomhub-ransomware-what-you-need-know
  7. https://www.obrela.com/advisory/ransomhub-increased-ransomware-attacks/
  8. https://www.bitdefender.com/en-us/blog/hotforsecurity/bologna-fc-1909-confirms-ransomware-attack-after-sensitive-stolen-data-leaked-online
  9. https://www.bleepingcomputer.com/news/security/bologna-fc-confirms-data-breach-after-ransomhub-ransomware-attack/

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

BLOGS AND RESOURCES

Latest Articles

The Rise of INTERLOCK Ransomware

November 13, 2024

Fortifying the Cloud: A Guide to Securing Vulnerable Cloud Environments

October 23, 2024

The Emergence of Mallox v1.0

September 25, 2024