Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

June 2024’s Most Wanted Malware: RansomHub Takes Top Spot as Most Prevalent Ransomware Group in Wake of LockBit3 Decline

July 2024 by Check Point®

Check Point® Software Technologies Ltd. has published its Global Threat Index for June 2024. Last month, researchers noted a shift in the Ransomware-as-a-Service (RaaS) landscape, with relative newcomer RansomHub unseating LockBit3 to become the most prevalent group according to publicized shame sites. Meanwhile, a Windows backdoor dubbed BadSpace was identified, involving infected WordPress websites and fake browser updates.
Last month, RansomHub became the most prevalent RaaS group after law enforcement action against LockBit3 in February caused it to lose loyalty among its affiliates. As a result, LockBit3 reported a record low of only 27 victims in April, followed by an unexplained high number in May of more than 170, and less than 20 in June, signaling its potential decline.

Many LockBit3 affiliates now use encryptors of other RaaS groups, leading to increased reports of victims by other threat actors. RansomHub, which first emerged in February 2024 and is reportedly a reincarnation of the Knight ransomware, saw a significant rise in June with nearly 80 new victims. Notably, only 25% of its published victims are from the USA, with significant numbers from Brazil, Italy, Spain, and the UK.

In other developments, researchers highlighted a recent FakeUpdates campaign (also known as SocGholish), which ranked as the most prevalent malware, now delivering a new backdoor called BadSpace. The proliferation of FakeUpdates has been facilitated through a third-party affiliate network, which redirects traffic from compromised websites to FakeUpdates landing pages. These pages then prompt users to download what appears to be a browser update. However, this download actually contains a JScript-based loader that subsequently downloads and executes the BadSpace backdoor. BadSpace employs sophisticated obfuscation and anti-sandbox techniques to avoid detection and maintains persistence through scheduled tasks. Its command-and-control communication is encrypted, making it difficult to intercept.
“It appears that actions against LockBit3 have had the desired impact. However, as previously suggested, its decline only makes way for other groups to take control and continue their ransomware campaigns against organizations globally, “said Maya Horowitz, VP of Research at Check Point Software
Top malware families
*The arrows relate to the change in rank compared to the previous month.

FakeUpdates was the most prevalent malware this month with an impact of 7% worldwide organizations, followed by Androxgh0st with a global impact of 6%, and AgentTesla with a global impact of 3%.

1. ↔ FakeUpdates – FakeUpdates (AKA SocGholish) is a downloader written in JavaScript. It writes the payloads to disk prior to launching them. FakeUpdates led to further compromise via many additional malwares, including GootLoader, Dridex, NetSupport, DoppelPaymer, and AZORult.

2. ↔ Androxgh0st – Androxgh0st is a botnet that targets Windows, Mac, and Linux platforms. For initial infection, Androxgh0st exploits multiple vulnerabilities, specifically targeting- the PHPUnit, Laravel Framework, and Apache Web Server. The malware steals sensitive information such as Twilio account information, SMTP credentials, AWS key, etc. It uses Laravel files to collect the required information. It has different variants which scan for different information.

3. ↑ AgentTesla – AgentTesla is an advanced RAT functioning as a keylogger and information stealer, which is capable of monitoring and collecting the victim’s keyboard input, system keyboard, taking screenshots, and exfiltrating credentials to a variety of software installed on a victim’s machine (including Google Chrome, Mozilla Firefox and the Microsoft Outlook email client).

Top exploited vulnerabilities
Last month, “Check Point VPN Information Disclosure” was the most exploited vulnerability, impacting 51% of organizations globally, closely followed by “Web Servers Malicious URL Directory Traversal” with 49% and “HTTP Headers Remote Code Execution” with a global impact of 44%.

1. ↑ Check Point VPN Information Disclosure (CVE-2024-24919) - An information disclosure vulnerability was discovered in Check Point VPN. The vulnerability potentially allows an attacker to read certain information on Internet-connected Gateways with remote access VPN or mobile access enabled.

2. ↔ Web Servers Malicious URL Directory Traversal (CVE-2010-4598,CVE-2011-2474,CVE-2014-0130,CVE-2014-0780,CVE-2015-0666,CVE-2015-4068,CVE-2015-7254,CVE-2016-4523,CVE-2016-8530,CVE-2017-11512,CVE-2018-3948,CVE-2018-3949,CVE-2019-18952,CVE-2020-5410,CVE-2020-8260) - There exists a directory traversal vulnerability On different web servers. The vulnerability is due to an input validation error in a web server that does not properly sanitize the URI for the directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.

3. ↑ HTTP Headers Remote Code Execution (CVE-2020-10826, CVE-2020-10827, CVE-2020-10828, CVE-2020-1375) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine.

Top Mobile Malwares
Last month Joker was in first place as the most prevalent Mobile malware, followed by Anubis and AhMyth.

1. ↑ Joker – An android Spyware in Google Play, designed to steal SMS messages, contact lists and device information. Furthermore, the malware signs the victim silently for premium services in advertisement websites.

2. ↓ Anubis – Anubis is a banking Trojan malware designed for Android mobile phones. Since it was initially detected, it has gained additional functions including Remote Access Trojan (RAT) functionality, keylogger, audio recording capabilities and various ransomware features. It has been detected on hundreds of different applications available in the Google Store.

3. ↓ AhMyth - AhMyth is a Remote Access Trojan (RAT) discovered in 2017. It is distributed through Android apps that can be found on app stores and various websites. When a user installs one of these infected apps, the malware can collect sensitive information from the device and perform actions such as keylogging, taking screenshots, sending SMS messages, and activating the camera, which is usually used to steal sensitive information.

Top-Attacked Industries Globally
Last month, Education/Research remained in first place in the most attacked industries globally, followed by Government/Military and Healthcare.

1. Education/Research
2. Government/Military
3. Healthcare
Top Ransomware Groups
The data is based on insights from ransomware "shame sites" run by double-extortion ransomware groups which posted victim information. RansomHub was the most prevalent ransomware group last month, responsible for 21% of the published attacks, followed by Play with 8% and Akira with 5%.

1. RansomHub – RansomHub is a Ransomware-as-a-Service (RaaS) operation that emerged as a rebranded version of the previously known Knight ransomware. Surfacing prominently in early 2024 in underground cybercrime forums, RansomHub has quickly gained notoriety for its aggressive campaigns targeting various systems including Windows, macOS, Linux, and particularly VMware ESXi environments. This malware is known for employing sophisticated encryption methods.

2. Play – Play Ransomware, also referred to as PlayCrypt, is a ransomware that first emerged in June 2022. This ransomware has targeted a broad spectrum of businesses and critical infrastructure across North America, South America, and Europe, affecting approximately 300 entities by October 2023. Play Ransomware typically gains access to networks through compromised valid accounts or by exploiting unpatched vulnerabilities, such as those in Fortinet SSL VPNs. Once inside, it employs techniques like using living-off-the-land binaries (LOLBins) for tasks such as data exfiltration and credential theft.

3. Akira – Akira Ransomware, first reported in the beginning of 2023, targets both Windows and Linux systems. It uses symmetric encryption with CryptGenRandom() and Chacha 2008 for file encryption and is similar to the leaked Conti v2 ransomware. Akira is distributed through various means, including infected email attachments and exploits in VPN endpoints. Upon infection, it encrypts data and appends a ".akira" extension to file names, then presents a ransom note demanding payment for decryption.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts