» » Deep Dive Into Ragnar Locker Ransomware Targeting Critical Industries

Deep Dive Into Ragnar Locker Ransomware Targeting Critical Industries

Deep Dive Into Ragnar Locker Ransomware Targeting Critical Industries

Residence › Malware

Deep Dive Into Ragnar Locker Ransomware Focusing on Crucial Industries

By Kevin Townsend on September 01, 2022

Tweet

Evaluation of Ragnar Locker Ransomware that has been focusing on the power sector

The Ragnar group, working Ragnar Locker ransomware, has been lively since 2019 focusing on important industries and using double extortion. In March 2022, the FBI warned that at the very least 52 entities throughout ten important business sectors have been affected. In August 2022, the group attacked Greek fuel provider Desfa, and subsequently leaked delicate information it claimed to have stolen.

Researchers at Cybereason have analyzed the encryption strategy of Ragnar Locker.

On execution, Ragnar Locker does a location examine. If the placement is any nation within the Commonwealth of Impartial States (CIS), execution is terminated.

Ragnar Locker execution move

It then collects host info, together with the pc identify and person identify, and the machine GUID and Home windows model. This information is concatenated and hid by a customized hashing perform. A brand new occasion is created utilizing the mixed hashes because the identify. Ragnar Locker then seeks to determine present file volumes utilizing the Home windows APICreateFileW. 

An inventory of companies embedded throughout the Ragnar Locker code is decrypted. This consists of vss, sql, memtas, mepocs, sophos, veeam, backup, pulseway, logme, logmein, connectwise, splashtop, kaseya, vmcompute, Hyper-v, vmms, Dfs. If any of those are discovered as a working service, it’s terminated by the malware.

The malware then decrypts an embedded RSA public key and prepares it to be used. It decrypts the embedded ransom notice and proceeds to delete any shadow copies of the host through vssadmin.exe and Wmic.exe.

Within the analyzed pattern, the ransom notice provides, “Additionally, your entire delicate and personal info have been gathered and when you determine NOT to pay, we’ll add it for public view!” The Ragnar Locker information leak website on Tor (http [://] rgleaktxuey67yrgspmhvtnrqtgogur35lwdrup4d3igtbm3pupc4lyd [.] onion/) at the moment lists round 70 claimed victims.

The notice calls for a ransom of 25 bitcoins, however implies this could possibly be negotiated if contact is made inside two days. Nonetheless, it warns that the ransom will double if there is no such thing as a contact inside 14 days, whereas the decryption key can be destroyed if no cost settlement isn’t reached inside 21 days.

It additionally provides that the ransom determine has been tailor-made by the attackers primarily based on the sufferer’s ‘networks dimension, variety of workers, annual income’.

When the ransom notice is prepared, Ragnar Locker begins the encryption course of. Exclusions embrace the recordsdata autoruns.inf, boot.ini, bootfront.bin, bootsect.bak, bootmgr, bootmgr.efi, bootmgfw.efi, desktop.ini, iconcache.db, ntldr, ntuser.dat, ntuser.dat.log, ntuser.ini, thumbs.db; particular processes and objects akin to Home windows.previous, Tor Browser, Web Explorer, Google, Opera, Opera Software program, Mozilla, Mozilla Firefox, $Recycle.bin, ProgramData, All Customers; and recordsdata with the extensions .db, .sys, .dll, lnk, .msi, .drv, .exe.

The filenames of different recordsdata are despatched to the encryption perform which encrypts the corresponding file and appends the suffix ‘.ragnar_[hashed computer name]’. After encryption, Ragnar Locker creates a notepad.exe course of and shows the ransom notice on the person’s display.

The stolen information used within the double extortion course of is exfiltrated repeatedly as much as the purpose of encryption. Loic Castel, principal safety analyst at Cybereason’s World SOC instructed SecurityWeek, “On the whole, ransomware operatives doing double extortion at all times require full privileges on the community they need to encrypt.. Between the preliminary entry section (once they take management of an asset, as an example by spearphishing) and the encryption section, they’ve entry to many machines, which they will extract information from and ship by exfiltration companies / exterior domains.”

In a timeframe disclosed within the FBI alert, information exfiltration occurred virtually six weeks after the preliminary entry, and continued for about ten days earlier than the encryption course of started.

Ragnar Locker primarily targets companies throughout the important industries sector. “Ragnar Locker ransomware actors work as a part of a ransomware household, continuously altering obfuscation methods to keep away from detection and prevention,” warned the FBI in its March 2022 alert.

Associated: EDP Renewables North America Discloses Knowledge Breach

Associated: Ragnar Locker Ransomware Makes use of Digital Machines for Evasion

Associated: French Delivery Large CMA CGM Discloses Safety Breach

Associated: Hackers Demand $11 Million From Capcom After Ransomware Assault

Get the Every day Briefing

 
 
 

  • Most Current
  • Most Learn
  • Tech Software Affords Police ‘Mass Surveillance on a Finances’
  • Cyber Security for Summer season Trip
  • Deep Dive Into Ragnar Locker Ransomware Focusing on Crucial Industries
  • Hardcoded AWS Credentials in 1,800 Cellular Apps Spotlight Provide Chain Points
  • Chrome Bug Permits Webpages to Change Clipboard Contents
  • Ransomware Gang Claims Buyer Knowledge Stolen in TAP Air Portugal Hack
  • Ransomware Assaults Goal Authorities Businesses in Latin America
  • iOS 12 Replace for Older iPhones Patches Exploited Vulnerability
  • FBI’s Crew to Examine Huge Cyberattack in Montenegro
  • 1.four Million Customers Set up Chrome Extensions That Inject Code Into eCommerce Websites

Searching for Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act Via Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Learn how to Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

Learn how to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles