Deep Dive Into Ragnar Locker Ransomware Targeting Critical Industries By Orbit Brain September 1, 2022 0 289 viewsCyber Security News Residence › MalwareDeep Dive Into Ragnar Locker Ransomware Focusing on Crucial IndustriesBy Kevin Townsend on September 01, 2022TweetEvaluation of Ragnar Locker Ransomware that has been focusing on the power sectorThe Ragnar group, working Ragnar Locker ransomware, has been lively since 2019 focusing on important industries and using double extortion. In March 2022, the FBI warned that at the very least 52 entities throughout ten important business sectors have been affected. In August 2022, the group attacked Greek fuel provider Desfa, and subsequently leaked delicate information it claimed to have stolen.Researchers at Cybereason have analyzed the encryption strategy of Ragnar Locker.On execution, Ragnar Locker does a location examine. If the placement is any nation within the Commonwealth of Impartial States (CIS), execution is terminated.Ragnar Locker execution moveIt then collects host info, together with the pc identify and person identify, and the machine GUID and Home windows model. This information is concatenated and hid by a customized hashing perform. A brand new occasion is created utilizing the mixed hashes because the identify. Ragnar Locker then seeks to determine present file volumes utilizing the Home windows APICreateFileW. An inventory of companies embedded throughout the Ragnar Locker code is decrypted. This consists of vss, sql, memtas, mepocs, sophos, veeam, backup, pulseway, logme, logmein, connectwise, splashtop, kaseya, vmcompute, Hyper-v, vmms, Dfs. If any of those are discovered as a working service, it’s terminated by the malware.The malware then decrypts an embedded RSA public key and prepares it to be used. It decrypts the embedded ransom notice and proceeds to delete any shadow copies of the host through vssadmin.exe and Wmic.exe.Within the analyzed pattern, the ransom notice provides, “Additionally, your entire delicate and personal info have been gathered and when you determine NOT to pay, we’ll add it for public view!” The Ragnar Locker information leak website on Tor (http [://] rgleaktxuey67yrgspmhvtnrqtgogur35lwdrup4d3igtbm3pupc4lyd [.] onion/) at the moment lists round 70 claimed victims.The notice calls for a ransom of 25 bitcoins, however implies this could possibly be negotiated if contact is made inside two days. Nonetheless, it warns that the ransom will double if there is no such thing as a contact inside 14 days, whereas the decryption key can be destroyed if no cost settlement isn’t reached inside 21 days.It additionally provides that the ransom determine has been tailor-made by the attackers primarily based on the sufferer’s ‘networks dimension, variety of workers, annual income’.When the ransom notice is prepared, Ragnar Locker begins the encryption course of. Exclusions embrace the recordsdata autoruns.inf, boot.ini, bootfront.bin, bootsect.bak, bootmgr, bootmgr.efi, bootmgfw.efi, desktop.ini, iconcache.db, ntldr, ntuser.dat, ntuser.dat.log, ntuser.ini, thumbs.db; particular processes and objects akin to Home windows.previous, Tor Browser, Web Explorer, Google, Opera, Opera Software program, Mozilla, Mozilla Firefox, $Recycle.bin, ProgramData, All Customers; and recordsdata with the extensions .db, .sys, .dll, lnk, .msi, .drv, .exe.The filenames of different recordsdata are despatched to the encryption perform which encrypts the corresponding file and appends the suffix ‘.ragnar_[hashed computer name]’. After encryption, Ragnar Locker creates a notepad.exe course of and shows the ransom notice on the person’s display.The stolen information used within the double extortion course of is exfiltrated repeatedly as much as the purpose of encryption. Loic Castel, principal safety analyst at Cybereason’s World SOC instructed SecurityWeek, “On the whole, ransomware operatives doing double extortion at all times require full privileges on the community they need to encrypt.. Between the preliminary entry section (once they take management of an asset, as an example by spearphishing) and the encryption section, they’ve entry to many machines, which they will extract information from and ship by exfiltration companies / exterior domains.”In a timeframe disclosed within the FBI alert, information exfiltration occurred virtually six weeks after the preliminary entry, and continued for about ten days earlier than the encryption course of started.Ragnar Locker primarily targets companies throughout the important industries sector. “Ragnar Locker ransomware actors work as a part of a ransomware household, continuously altering obfuscation methods to keep away from detection and prevention,” warned the FBI in its March 2022 alert.Associated: EDP Renewables North America Discloses Knowledge BreachAssociated: Ragnar Locker Ransomware Makes use of Digital Machines for EvasionAssociated: French Delivery Large CMA CGM Discloses Safety BreachAssociated: Hackers Demand $11 Million From Capcom After Ransomware AssaultGet the Every day Briefing Most CurrentMost LearnTech Software Affords Police ‘Mass Surveillance on a Finances’Cyber Security for Summer season TripDeep Dive Into Ragnar Locker Ransomware Focusing on Crucial IndustriesHardcoded AWS Credentials in 1,800 Cellular Apps Spotlight Provide Chain PointsChrome Bug Permits Webpages to Change Clipboard ContentsRansomware Gang Claims Buyer Knowledge Stolen in TAP Air Portugal HackRansomware Assaults Goal Authorities Businesses in Latin AmericaiOS 12 Replace for Older iPhones Patches Exploited VulnerabilityFBI’s Crew to Examine Huge Cyberattack in Montenegro1.four Million Customers Set up Chrome Extensions That Inject Code Into eCommerce WebsitesSearching for Malware in All of the Incorrect Locations?First Step For The Web’s subsequent 25 years: Including Safety to the DNSTattle Story: What Your Pc Says About YouBe in a Place to Act Via Cyber Situational ConsciousnessReport Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant2010, A Nice Yr To Be a Scammer.Do not Let DNS be Your Single Level of FailureLearn how to Establish Malware in a BlinkDefining and Debating Cyber WarfareThe 5 A’s that Make Cybercrime so EngagingLearn how to Defend Towards DDoS AssaultsSafety Budgets Not in Line with ThreatsAnycast – Three Causes Why Your DNS Community Ought to Use ItThe Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering OrganizationsUtilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise Desfa malware Ragnar Locker ransomware threat Orbit Brainhttp://orbitbrain.com/ Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy waysand much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.
Hacker Claims Breach of FBI’s Critical-Infrastructure PortalIntroducing the Cyber Security News Hacker Claims Breach of FBI’s Critical-Infrastructure Portal.... December 15, 2022 Cyber Security News
Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer AccountsIntroducing the Cyber Security News Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer Accounts.... June 17, 2022 Cyber Security News
Okta Impersonation Technique Could be Utilized by AttackersIntroducing the Cyber Security News Okta Impersonation Technique Could be Utilized by Attackers.... August 30, 2022 Cyber Security News
IDA Pro Owner Hex-Rays Acquired by European VC FirmIntroducing the Cyber Security News IDA Pro Owner Hex-Rays Acquired by European VC Firm.... October 18, 2022 Cyber Security News
Australian Telecoms Firm Optus Discloses Breach Impacting Customer DataIntroducing the Cyber Security News Australian Telecoms Firm Optus Discloses Breach Impacting Customer Data.... September 22, 2022 Cyber Security News
Mailing List Provider WordFly Scrambling to Recover Following Ransomware AttackIntroducing the Cyber Security News Mailing List Provider WordFly Scrambling to Recover Following Ransomware Attack.... July 27, 2022 Cyber Security News