{"id":20043,"date":"2022-09-07T16:10:18","date_gmt":"2022-09-08T00:10:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/09\/07\/news-13776\/"},"modified":"2022-09-07T16:10:18","modified_gmt":"2022-09-08T00:10:18","slug":"news-13776","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/09\/07\/news-13776\/","title":{"rendered":"Warning issued about Vice Society ransomware targeting the education sector"},"content":{"rendered":"<p>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint &nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-249a\" target=\"_blank\">Cybersecurity Advisory (CSA)<\/a> after observing Vice Society threat actors disproportionately targeting the education sector with ransomware attacks.<\/p>\n<p>Over the past several years, the education sector, especially kindergarten through twelfth grade (K-12) institutions, have been a frequent target of ransomware attacks. School districts with limited cybersecurity capabilities and constrained resources are often the most vulnerable.<\/p>\n<p>This CSA is part of an ongoing <a href=\"https:\/\/www.cisa.gov\/stopransomware\/stopransomware\" target=\"_blank\">#StopRansomware<\/a> effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. After issuing advisories about&nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/sites\/default\/files\/publications\/AA22-181A_stopransomware_medusalocker.pdf\" target=\"_blank\">MedusaLocker<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/cisa-and-fbi-issue-alert-about-zeppelin-ransomware\">Zeppelin ransomware<\/a>, this is the third CSA of 2022 which aims to provide technical information on ransomware variants and ransomware threat actors.<\/p>\n<h2>Vice Society<\/h2>\n<p>Vice Society is believed to be a Russian-based intrusion, exfiltration, and extortion group. Malwarebytes has been tracking the group since December 2020. Due to similarities in naming and tactics we&nbsp;suspect there is a tie to the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/03\/hellokitty-when-cyberpunk-met-cy-purr-crime\">HelloKitty ransomware<\/a> group. Both use the <em>.kitty<\/em> or <em>.crypted<\/em> file extension for encrypted files. According to CISA, the Vice Society actors do not use a ransomware variant of unique origin. Instead, the actors have deployed versions of Hello Kitty\/Five Hands and Zeppelin ransomware, but may just as easily deploy other variants in the future.<\/p>\n<p>The group also operates a so-called &lsquo;leak site&rsquo; where exfiltrated files are made available if the victims decide not to pay the ransom.<\/p>\n<h2>Tactics<\/h2>\n<p>Vice Society has been known to exploit known vulnerabilities in <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/07\/sonicwall-warns-users-of-imminent-ransomware-campaign\">SonicWall products<\/a>,&nbsp;and the set of vulnerabilities commonly referred to as <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/08\/microsofts-printnightmare-continues-shrugs-off-patch-tuesday-fixes\">PrintNightmare<\/a>. The CSA also mentions the gang exploiting internet-facing applications without providing details.<\/p>\n<p>Prior to deploying ransomware, the actors spend time exploring the network, identifying opportunities to increase accesses, and exfiltrate data. Vice Society actors have been observed using a variety of tools, including SystemBC, PowerShell Empire, and <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/06\/cobalt-strike-a-penetration-testing-tool-popular-among-criminals\">Cobalt Strike<\/a>&nbsp;in order&nbsp;to move laterally.<\/p>\n<h2>Los Angeles Unified school district<\/h2>\n<p>In a recent example of a school district targeted by ransomware, the huge Los Angeles Unified School District <a href=\"https:\/\/hothardware.com\/news\/ransomware-gang-second-largest-school-district\" target=\"_blank\">fell victim to a ransomware attack<\/a>. LAUSD is the second largest school district In the US, and the attack targeted the LAUSD&rsquo;s information technology systems during the Labor Day weekend. Authorities moved to shut down many of the district&rsquo;s most sensitive platforms over the weekend to stop the&nbsp;spread&nbsp;and restrict the damage, and by Tuesday most online services &mdash; including key emergency systems &mdash; were operating safely.<\/p>\n<p>The attack resulted in staff and students losing access to email. Systems that teachers use to post lessons and take attendance also went down.<\/p>\n<p>An investigation involving the FBI, the Department of Homeland Security and local law enforcement is underway.&nbsp;<\/p>\n<h2>Mitigation<\/h2>\n<p>From the example above we can&nbsp;see that constant monitoring and adequate intervention&nbsp;helped to limit the impact.<\/p>\n<p>Besides IOCs and attack techniques, the CSA provides a lot of mitigation advice. Since the techniques used by the Vice Society group are far from unique, the advice is worth repeating because it works against a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/08\/ransomware-review-july-2022\">lot of similar ransomware operators<\/a>.<\/p>\n<p>But you should also realize that while it&rsquo;s easy to&nbsp;say&nbsp;that you need reliable and easy to deploy backups, for example, it&rsquo;s not always easy to follow that advice. It is well worth pursuing though, since it may save your bacon at one time or another.<\/p>\n<h3>Backups<\/h3>\n<p>Implement a&nbsp;recovery plan&nbsp;to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud). Maintain&nbsp;offline backups&nbsp;of data, and regularly maintain backup and restoration.&nbsp;This&nbsp;makes it less likely that you will be severely interrupted, and\/or only have irretrievable data, in the event of a ransomware attack.<\/p>\n<p>Ensure all backup data is&nbsp;encrypted, immutable&nbsp;(i.e., cannot be altered or deleted), and covers the entire organization&rsquo;s data infrastructure.<\/p>\n<p>In a nutshell: Put your backups out of the reach of attackers, and make sure they work by testing that you can restore working systems from them.<\/p>\n<h3>Authentication<\/h3>\n<p>Require all accounts with&nbsp;password logins&nbsp;to meet the required standards for developing and managing password policies:<\/p>\n<ul type=\"disc\">\n<li>Require&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multifactor authentication<\/a>&nbsp;wherever you can&mdash;particularly for webmail, VPNs, and critical systems<\/li>\n<li>Review domain controllers, servers, workstations, and active directories for new and\/or unrecognized accounts<\/li>\n<li>Audit user accounts&nbsp;with administrative privileges and configure access controls according to the principle of least privilege<\/li>\n<li>Implement&nbsp;time-based access&nbsp;for accounts set at the admin level and higher<\/li>\n<li>Use long passwords (CISA says 8 characters, we say you can do better than that) and&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\">password managers<\/a><\/li>\n<li>Store passwords using industry best practice password hashing functions<\/li>\n<li>Implement password rate limits and lockouts<\/li>\n<li>Avoid frequent password resets (once a year is fine)<\/li>\n<li>Avoid reusing passwords<\/li>\n<li>Disable password &ldquo;hints&rdquo;<\/li>\n<li>Require administrator credentials to install software<\/li>\n<\/ul>\n<h3>Software<\/h3>\n<p>Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\">anti-malware software<\/a>, and keep all operating systems, software, and firmware up to date. (Timely&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching<\/a>&nbsp;is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.)<\/p>\n<h3>Networks<\/h3>\n<p>Segment networks to prevent the spread of ransomware and disrupt lateral movement. Identify, detect, and investigate abnormal activity with a network monitoring tool. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host. Disable unused ports.<\/p>\n<h3>Email<\/h3>\n<p>Consider adding an&nbsp;email banner&nbsp;to emails received from outside your organization.<\/p>\n<p>Disable hyperlinks in received emails.<\/p>\n<h3>Scripts<\/h3>\n<p>Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and\/or moving laterally.<\/p>\n<p>Stay safe, everyone!<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/09\/authorities-issue-warning-about-vice-society-ransomware-targeting-the-education-sector\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/news' rel='category tag'>News<\/a><\/p>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/ransomware' rel='category tag'>Ransomware<\/a><\/p>\n<p>Tags: FBI<\/p>\n<p>Tags:  CISA<\/p>\n<p>Tags:  StopRansomware<\/p>\n<p>Tags:  Vice Society<\/p>\n<p>Tags:  HelloKitty<\/p>\n<p>Tags:  SonicWall<\/p>\n<p>Tags:  PrintNightmare<\/p>\n<p>Tags:  LAUSD<\/p>\n<p>The FBI, CISA, and the MS-ISAC have released a joint Cybersecurity Advisory after observing Vice Society threat actors disproportionately targeting the education sector with ransomware attacks.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/09\/authorities-issue-warning-about-vice-society-ransomware-targeting-the-education-sector' title='Warning issued about Vice Society ransomware targeting the education sector'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/09\/authorities-issue-warning-about-vice-society-ransomware-targeting-the-education-sector'>Warning issued about Vice Society ransomware targeting the education sector<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23583,6627,25877,27463,32,27462,3765,18101,27460,27461],"class_list":["post-20043","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cisa","tag-fbi","tag-hellokitty","tag-lausd","tag-news","tag-printnightmare","tag-ransomware","tag-sonicwall","tag-stopransomware","tag-vice-society"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20043"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20043\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}