RansomHub extortion gang linked to now-defunct Knight ransomware
Security researchers analyzing the relatively new RansomHub ransomware-as-a-service believe that it has evolved from the currently defunct Knight ransomware project.
RansomHub has a short history and operated mainly as a data theft and extortion group that sells stolen files to the highest bidder.
The gang grabbed attention in mid-April when it leaked stolen data from United Health subsidiary Change Healthcare following a BlackCat/ALPHV attack, suggesting some form of collaboration between the two.
More recently, on May 28, the international auction house Christie’s admitted it had suffered a security incident after RansomHub threatened to leak stolen data.
Knight ransomware launched in late July 2023 as a re-brand of the Cyclops operation and started breaching Windows, macOS, Linux/ESXi machines to steal data and demand a ransom.
One of the peculiarities of Knight was that it also offered affiliates an info-stealer component that could make the attacks more impactful.
In February 2024, the source code for version 3.0 of Knight ransomware put up for sale on hacker forums, the victims extortion portal went offline, and the RaaS operation went silent.
RansomHub's Knight origin
Malware analysts at Symantec, part of Broadcom, found multiple similarities between the two ransomware families that point to a common origin:
- Both ransomware families are written in Go and use Gobfuscate for obfuscation.
- There are extensive code overlaps in the two malware payloads.
- Both use a unique obfuscation technique where important strings are encoded with unique keys.
- The ransom notes used by the two ransomware families are similar, with minor updates added on RansomHub.
- Both ransomware families restart endpoints in safe mode before encryption.
- The command-line help menus on the two families are identical, with the only difference being a ‘sleep’ command on RansomHub.
- The sequence and method of command execution operations are the same, though RansomHub now executes them via cmd.exe.
The above suggests that RansomHub was likely derived from Knight, and confirms that the extortion group indeed uses a data encryptor.
Also, the time RansomHub first appeared in the cybercrime space, in February 2024, matches the Knight source code sale.
According to the researchers, it is unlikely that RansomHub is run by Knight ransomware creators. They believe that another actor purchased the Knight source code and started using it in attacks.
Since it emerged, RansomHub has grown to become one of the most prolific RaaS operations, which Symantec attributes to the gang attracting former affiliates of the ALPHV operation, such as Notchy and Scattered Spider.
source: BleepingComputer
Free security scan for your website
Top News:
CISA orders federal agencies to secure Microsoft 365 tenants
December 18, 2024Google Chrome uses AI to analyze pages in new scam detection feature
December 21, 2024Recorded Future CEO applauds "undesirable" designation by Russia
December 19, 2024