{"id":18960,"date":"2022-05-06T01:10:08","date_gmt":"2022-05-06T09:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/06\/news-12693\/"},"modified":"2022-05-06T01:10:08","modified_gmt":"2022-05-06T09:10:08","slug":"news-12693","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/06\/news-12693\/","title":{"rendered":"Ransomware: April 2022 review"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Fri, 06 May 2022 08:59:41 +0000<\/strong><\/p>\n<p>The Malwarebytes Threat Intelligence team monitors the threat landscape continuously and produces monthly ransomware reports based on a mixture of proprietary and open-source intelligence.<\/p>\n<p>April 2022 was most notable for the emergence of three new ransomware-as-a-service (<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/ransomware-as-a-service\/\">RaaS<\/a>) groups\u2014<strong>Onyx<\/strong>, <strong>Mindware<\/strong>, and <strong>Black Basta<\/strong>\u2014as well as the unwelcome return of <strong>REvil<\/strong>, one of the world\u2019s most notorious and dangerous ransomware operations.<\/p>\n<h2 id=\"An-old-enemy-returns\">An old enemy returns<\/h2>\n<p><strong>REvil<\/strong> (aka Sodinokibi) first appeared in May 2020 and has been responsible for numerous high-profile ransomware attacks, including arguably the biggest ransomware attack of all time\u2014a supply-chain <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2021\/07\/shutdown-kaseya-vsa-servers-now-amidst-cascading-revil-attack-against-msps-clients\/\">attack on Kaseya VSA<\/a> in July 2021 that is thought to have affected over 1,000 businesses.<\/p>\n<p>REvil disappeared shortly after the Kaseya attack, only to emerge again a few months later, before being <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2021\/10\/revil-ransomware-gang-disappears-after-tor-services-hijacked\/\">forced offline<\/a> on October 21, 2021, by a multi-country operation. A <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/five-affiliates-to-sodinokibi\/revil-unplugged\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">string of arrests<\/a> followed, and then in January\u2014in an act of unprecedented co-operation\u2014Russia\u2019s Federal Security Service (FSB) announced that it had dismantled the REvil group and charged its members, thanks to the information provided by the USA.<\/p>\n<p>REvil now seems to have returned to the fray with new payloads, and a new leak blog displaying a mixture of new victims and old victims known to have been attacked by REvil.<\/p>\n<h2 id=\"New-gangs-emerge\">New gangs emerge<\/h2>\n<p><strong>Black Basta<\/strong> made a name for itself very<strong> <\/strong>quickly by coming out of nowhere and carrying out at least eleven successful breaches in April 2022. That ability to perform so many attacks so quickly has led some to speculate that Black Basta is a re-brand of an existing group that already has affiliates.<\/p>\n<p><strong>Onyx<\/strong> is a new ransomware gang based on the old Chaos builder. At first, some suspected that Onyx <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/04\/onyx-ransomware-destroys-files-and-also-the-criminal-circle-of-trust\/\">may be a wiper<\/a> rather than ransomware because it destroyed files larger than 2MB instead of encrypting them. It seems likely that this behavior is the result of a bug in the notoriously poorly-written ransomware builder though.<\/p>\n<p>Another newly-emerged gang is <strong>Mindware<\/strong>, which appears to have started operations in mid-March using a well-known ransomware strain called SFile2 (aka Escal)\u2014but it was not until April that it began to practice &#8220;double extortion&#8221;, where data is stolen before it&#8217;s encrypted so that victims are faced with the twin threats of data they can&#8217;t decrypt, and leaks of sensitive information.<\/p>\n<h2 id=\"Ransomware-attacks-in-April-2022\"><strong>Ransomware attacks in April 2022<\/strong><\/h2>\n<p>Malwarebytes Threat Intelligence builds a monthly picture of ransomware activity by monitoring the information published by ransomware gangs on their Dark Web leak sites. This information represents victims who were successfully attacked but opted not to pay a ransom.<\/p>\n<h3 id=\"Attacks-by-ransomware-type\"><strong>Attacks by ransomware type<\/strong><\/h3>\n<p>Despite its rapid start, the activities of Black Basta and the other newly-emerged types of ransomware were dwarfed in April by three established threats: LockBit, Conti, and AlphV, which made up 60 percent of all the known breaches in our analysis.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"56413\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/attachment\/rw_apr_01\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01.png\" data-orig-size=\"1200,600\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RW_apr_01\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01-300x150.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01-600x300.png\" width=\"1200\" height=\"600\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01.png\" alt=\"Ransomware attacks in April 2022 by type of ransomware\" class=\"wp-image-56413\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01.png 1200w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01-300x150.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_01-600x300.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><figcaption>Known ransomware attacks in April 2022 by type of ransomware<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56407\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/attachment\/rw_apr_02\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02.png\" data-orig-size=\"881,563\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RW_apr_02\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02-300x192.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02-600x383.png\" loading=\"lazy\" width=\"881\" height=\"563\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02.png\" alt=\"Known ransomware attacks in April 2022 by country\" class=\"wp-image-56407\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02.png 881w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02-300x192.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_02-600x383.png 600w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/a><figcaption>Known ransomware attacks in April 2022 by country<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56414\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/attachment\/rw_apr_03-1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1.png\" data-orig-size=\"1200,605\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RW_apr_03-1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1-300x151.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1-600x303.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1.png\" alt=\"\" class=\"wp-image-56414\" width=\"720\" height=\"364\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1.png 1200w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1-300x151.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/RW_apr_03-1-600x303.png 600w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/a><figcaption>Known ransomware attacks in April 2022 by industry<\/figcaption><\/figure>\n<\/div>\n<h2 id=\"Ransomware-Mitigations\"><strong>Ransomware mitigations<\/strong><\/h2>\n<p>Source: <a href=\"http:\/\/ic3.gov\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">IC3.gov<\/a><\/p>\n<ul>\n<li>Implement regular backups of all data to be stored as air-gapped, password-protected copies offline. Ensure these copies are not accessible for modification or deletion from any system where the original data resides.<\/li>\n<li>Implement network segmentation, such that all machines on your network are not accessible from every other machine.<\/li>\n<li>Install and regularly update antivirus software on all hosts, and enable real-time detection.<\/li>\n<li>Install updates\/patch operating systems, software, and firmware as soon as updates\/patches are released.<\/li>\n<li>Review domain controllers, servers, workstations, and active directories for new or unrecognized user accounts.<\/li>\n<li>Audit user accounts with administrative privileges and configures access controls with the least privilege in mind. Do not give all users administrative privileges.<\/li>\n<li>Disable unused remote access\/Remote Desktop Protocol (RDP) ports and monitor remote access\/RDP logs for any unusual activity.<\/li>\n<li>Consider adding an email banner to emails received from outside your organization.<\/li>\n<li>Disable hyperlinks in received emails.<\/li>\n<li>Use double authentication when logging into accounts or services.<\/li>\n<li>Ensure routine auditing is conducted for all accounts.<\/li>\n<li>Ensure all the identified IOCs are input into the network SIEM for continuous monitoring and alerts.<\/li>\n<\/ul>\n<h2 id=\"How-Malwarebytes-protects-against-ransomware\"><strong>How Malwarebytes protects against ransomware<\/strong><\/h2>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50.png\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"56405\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/attachment\/2022-04-29_20-09-50\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50.png\" data-orig-size=\"1299,1156\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2022-04-29_20-09-50\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50-300x267.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50-600x534.png\" loading=\"lazy\" width=\"1299\" height=\"1156\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50.png\" alt=\"\" class=\"wp-image-56405\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50.png 1299w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50-300x267.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/2022-04-29_20-09-50-600x534.png 600w\" sizes=\"auto, (max-width: 1299px) 100vw, 1299px\" \/><\/a><\/figure>\n<\/div>\n<p>Malwarebytes can protect systems against all <a href=\"https:\/\/www.malwarebytes.com\/ransomware\">ransomware<\/a> variants in several ways.<\/p>\n<p>The Malwarebytes Anti-Malware technology detects malicious files, browser modifications, and system modifications on Windows PCs using a combination of signature-based and signatureless technologies. This layer of protection detects the Ransomware binary itself. Detections can happen in real-time as the binary is run or the infection can be rooted out from an already-compromised machine by conducting a full system scan.<\/p>\n<p>Anti-Ransomware is a signatureless technology in charge of monitoring system activity of processes against a certain subset of data in specific locations on the endpoint. Using patented technology, Anti-Ransomware assesses changes in those data files. If an internal scoring threshold is crossed by a monitored process, it triggers a detection from the Anti-Ransomware component.<\/p>\n<p>For those already infected, Ransomware Rollback can help recover encrypted files within 72 hours of the attack. Rollback creates a local cache on the endpoint to store changes to files on the system. It can use this cache to help revert changes caused by a threat. The rollback feature is dependent on activity monitoring available in <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes Endpoint Detection and Response.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/\">Ransomware: April 2022 review<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Fri, 06 May 2022 08:59:41 +0000<\/strong><\/p>\n<p>April 2022 saw the arrival of three new ransomware gangs and the unwelcome return of an old enemy.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/ransomware-april-2022-review\/\">Ransomware: April 2022 review<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26001,26002,25856,3765,22297,12040],"class_list":["post-18960","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-black-basta","tag-mindware","tag-onyx","tag-ransomware","tag-revil","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18960"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18960\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18960"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}