{"id":22469,"date":"2023-07-13T16:10:23","date_gmt":"2023-07-14T00:10:23","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/13\/news-16199\/"},"modified":"2023-07-13T16:10:23","modified_gmt":"2023-07-14T00:10:23","slug":"news-16199","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/13\/news-16199\/","title":{"rendered":"Ransomware review: July 2023"},"content":{"rendered":"<p><em>This article is based on research by Marcelo Rivero, Malwarebytes&#8217; ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, &#8220;known attacks&#8221; are those where the victim&nbsp;<strong>did not<\/strong> pay a ransom. This provides the best overall picture of ransomware activity, but the true number of attacks is far higher.<\/em><\/p>\n<p>Following a three-month lull of activity, Cl0p returned with a vengeance in June and beat out LockBit as the month&rsquo;s most active ransomware gang.&nbsp;The group&#8217;s&nbsp;91 attacks come not long after their extensive <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/03\/clop-ransomware-is-victimizing-goanywhere-mft-customers\">GoAnywhere campaign in March<\/a>, when they hit over 100 organizations using a nasty zero-day.<\/p>\n<p>June also witnessed a staggering increase in attacks from relatively new gangs such as Akira (26) and 8Base (41), enough to propel both of them into the top five&mdash;a designation usually reserved for more familiar names like ALPHV, who was conspicuously silent in June.&nbsp;<\/p>\n<p>Other big stories in June include a suspected LockBit affiliate arrest, the Royal ransomware gang toying with a new encryptor, and a notable increase in attacks on the Manufacturing sector.<\/p>\n<figure style=\"text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file3825_272581_e.jpg\" alt=\"\" \/><br \/><figcaption>Known ransomware attacks by gang, June 2023<\/figcaption><\/figure>\n<p>Comparing June to the earlier months of the year, we notice several shifts in ransomware activity. There was a massive decrease in the activity&nbsp;from Royal, for example,&nbsp;which normally dominates the&nbsp;monthly rankings&mdash;often cracking into the top five&mdash;with an average of roughly 30 attacks a month in that period. But last month, they posted just&nbsp;two victims.&nbsp;<\/p>\n<p>While a sudden dip in attacks isn&#8217;t too unusual for top ransomware gangs, it&#8217;s worth <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/06\/ransomware-review-june-2023\">mentioning that in last month&rsquo;s review we speculated that Royal <\/a>might be going through a rebrand. That&#8217;s because a new&nbsp;ransomware called BlackSuit had appeared which shared 98 percent&nbsp;of its code with the infamous Royal ransomware.<\/p>\n<p>Considering that both Royal and BlackSuit were active last month, however, a rebrand probably isn&rsquo;t happening any time soon. Instead, it&rsquo;s likely that Royal is simply testing a new encryptor&mdash;especially considering that BlackSuit was used in just two attacks last month&mdash;and that this lull can be explained as more or less of a research period for them.<\/p>\n<p>Other&nbsp;interesting&nbsp;anomalies&nbsp;in&nbsp;June include 47 attacks on the Manufacturing industry&nbsp;(which usually averages around 20 attacks a month) and notable increases in attacks on Switzerland (14) and Brazil (13), both of which are normally attacked only two or three times a month. Part of this can be explained by the fact that 8BASE disproportionately attacked Brazil with 11 attacks last month, while PLAY focused on Switzerland (5).<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file50709_272581_e.jpg\" alt=\"Known ransomware attacks by country, June 2023\" caption=\"false\" width=\"700\" height=\"575\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Known ransomware attacks by country, June 2023<\/p>\n<\/p>\n<figure style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file70212_272581_e.jpg\" alt=\"Known ransomware attacks by industry sector, June 2023\" caption=\"false\" width=\"700\" height=\"550\" \/><figcaption>Known ransomware attacks by industry sector, June 2023<\/figcaption><\/figure>\n<p>Cl0p&#8217;s precipitous rise to the top of the charts this month, on the other hand, can be explained by their <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/cl0p-ransomware-gang-claims-first-victims-of-the-moveit-vulnerability\">exploitation of a zero-day in MOVEit Transfer<\/a>, a widely used file transfer software.<\/p>\n<p>The vulnerability, which could allow attackers to gain escalated privileges and unauthorized access to an environment,<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/update-now-moveit-transfer-vulnerability-actively-exploited\"> was first disclosed on May 31st<\/a> in a security bulletin released by Progress. But while it was clear earlier on that attackers were actively exploiting CVE-2023-34362, it was only a few days later that it became clear that Cl0p was behind the attacks. A Cl0p representative confirmed that they had been testing the vulnerability since July 2021 and that they had decided to deploy it over the Memorial Day weekend. What&rsquo;s more, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/moveit-discloses-yet-another-vulnerability-three-times-a-charm\">two other vulnerabilities i<\/a>n MOVEit were found while new victims were still coming forward.<\/p>\n<p>In terms of the fallout, it&rsquo;s tough to overstate the havoc Cl0p was able to wreck thanks to the zero-day.<\/p>\n<p>The MOVEit data breaches had widespread impacts, affecting everything from the Oregon DMV and Louisiana OMV (Office of Motor Vehicles)&mdash;including the leak of nearly 10 million drivers&#8217; licenses&mdash;to the University of Rochester and multiple corporations. PBI Research Services also reported a data breach that exposed information for 4.75 million people. The government even offered a reward of up to <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/rewards-up-to-10-million-for-information-about-cl0p-ransomware-operation\">$10 million for information on Cl0p after several federal agencies in the US fell victim to the gang<\/a>.<\/p>\n<h2>LockBit&nbsp;<\/h2>\n<p>LockBit reportedly squeezed about <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/06\/lockbit-ransomware-advisory-from-cisa-provides-interesting-insights\">$91 million out of US organizations <\/a>with around 1,700 attacks since 2020, according to a June report by CISA. <a href=\"https:\/\/press.malwarebytes.com\/2023\/02\/23\/research-reveals-lockbit-ransomware-surges-while-android-droppers-emerge-as-top-business-threat\/\">As confirmed by our own research data<\/a>, CISA also found LockBit&nbsp;took the top spot as the biggest global ransomware threat in 2022.<\/p>\n<p>As for who was hit the hardest, around 16 percent of ransomware incidents affecting State, Local, Tribal, and Tribunal (SLTT) governments were from LockBit, says the MS-ISAC.<\/p>\n<p>In other news, a suspected LockBit affiliate named Ruslan Magomedovich Astamirov, a 20-year-old from the Chechen Republic, was&nbsp;arrested in Arizona last month. <a href=\"https:\/\/www.justice.gov\/usao-nj\/pr\/russian-national-charged-conspiring-commit-lockbit-ransomware-attacks-against-us-and\">The US Justice Department <\/a>thinks he&#8217;s been deploying LockBit ransomware on victim networks both in the States and overseas, with the investigation&nbsp;having&nbsp;run from August 2020 through March 2023.<\/p>\n<p>Astamirov is now facing charges of wire fraud and of intentionally damaging protected computers, plus he&#8217;s accused of making ransom demands through deploying ransomware. The arrest makes him the third LockBit affiliate charged in the US since November.<\/p>\n<h2>Newcomers<\/h2>\n<h3>NoEscape<\/h3>\n<p>NoEscape is a new ransomware which been doing the rounds in underground forums since May 2023. Developed in-house using C++, the&nbsp;NoEscape&nbsp;ransomware&nbsp;uses a hybrid approach to encryption, combining ChaCha20 and RSA encryption algorithms for file encryption and key protection.<\/p>\n<p>Last month,&nbsp;NoEscape posted 7 victims on their leak site.<\/p>\n<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file71622_272581_e.png\" alt=\"\" width=\"831\" height=\"994\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h3>Darkrace<\/h3>\n<p>DarkRace is a new ransomware group first discovered by researcher S!Ri. Darkrace specifically targets Windows operating systems&nbsp;and has&nbsp;several similarities to LockBit.<\/p>\n<p>The gang attacked&nbsp;10 victims last month, the majority of them being from the Information and Communications Technology (ICT) sectors. Geographically, most victims are located in Europe, specifically Italy.&nbsp;<\/p>\n<h3>Rhysida<\/h3>\n<p>Rhysida, a new ransomware gang claiming to be a &#8220;cybersecurity team,&#8221; has been in operation since May 17, 2023, making headlines for their high-profile attack <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1663255077413322767?lang=en\">against the Chilean Army<\/a>.&nbsp;<\/p>\n<p>The gang&nbsp;published&nbsp;a whopping eighteen&nbsp;victims on their leak site in June, making it one of the most prolific newcomers in our&nbsp;month reviews to-date.<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/easset_upload_file53702_272581_e.png\" alt=\"\" width=\"832\" height=\"1041\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/ransomware-review-july-2023\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Following a three-month lull of activity, Cl0p returned with a vengeance in June and beat out LockBit as the month\u2019s most active ransomware gang. <\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/ransomware-review-july-2023\" title=\"Ransomware review: July 2023\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/ransomware-review-july-2023\">Ransomware review: July 2023<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-22469","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22469"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22469\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22469"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}