Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Human-Operated Ransomware Is a Growing Threat to Businesses: Microsoft

Employing techniques usually associated with nation-state threat actors, human-operated ransomware attacks represent a growing threat to businesses, Microsoft warned last week.

Employing techniques usually associated with nation-state threat actors, human-operated ransomware attacks represent a growing threat to businesses, Microsoft warned last week.

Different from auto-spreading ransomware, these are hands-on-keyboard attacks, where attackers use stolen credentials, perform reconnaissance, adapt to the compromised network’s configuration, and show extensive knowledge of systems administration.

Configuration weaknesses and vulnerable services are abused to perform the attack, which might also involve the delivery of other malicious payloads, credential theft, and data exfiltration.

As part of long-running campaigns that employ such ransomware attacks, adversaries compromise accounts with higher privileges, escalate privileges on the network, or use credential dumping techniques to establish a foothold in the compromised network.

REvil, Samas, Bitpaymer, and Ryuk are some of the most infamous human-operated ransomware campaigns, but other prolific threat actors have emerged recently, demonstrating a need for comprehensive defenses that can stop the attacks in their infancy, Microsoft says.

The company, which has been tracking several adversaries that deploy ransomware in such a manner, has observed similarities in the techniques employed by three adversaries behind active human-operated ransomware campaigns.

The first is PARINACOTA, which Microsoft has been tracking for 18 months, and which appears to be highly active, hitting three to four organizations each week, and able to quickly adapt to the configuration of the compromised network.

Over time, the group has changed tactics to match its needs and abused the compromised systems for crypto-currency mining, spam, or as proxies for other attacks. The group also changed payloads, but mostly deployed the Wadhrama ransomware over the past several months.

Advertisement. Scroll to continue reading.

The adversary frequently targets web-exposed Remote Desktop Protocol (RDP) servers, but adapts to any path of least resistance they can use. Often, brute force is employed for lateral movement and built-in local administrator accounts or Active Directory (AD) are targeted.

PARINACOTA employs a smash-and-grab method, where ransomware is deployed less than an hour after initial access. Reconnaissance is performed if the attackers can easily move throughout the compromised environment.

The attackers search the Internet for systems that listen on RDP port 3389, then proceed to brute force those they find. Following a successful compromise, they determine if the system can be abused to launch RDP attacks on other targets or should be used for other actions.

Using stolen credentials, the hackers attempt to dump credentials and turn off malware detection services, then proceed to download tools for credential theft, persistence, reconnaissance, and other activities, clear event logs and conduct reconnaissance to identify opportunities for lateral movement.

In addition to high-privilege account credentials, the group targets credentials for specific banking or financial websites. Even if the infected machines are used for crypto-mining or spam, the adversary in most cases returns after a few weeks to install ransomware.

Another ransomware family deployed by human operators through stolen credentials for privileged accounts is Doppelpaymer. Machines encrypted with the ransomware were also infected by banking Trojans like Dridex, suggesting that the former was used for initial access. However, Doppelpaymer-compromised networks also show signs of RDP brute force.

“The use of numerous attack methods reflects how attackers freely operate without disruption – even when available endpoint detection and response (EDR) and endpoint protection platform (EPP) sensors already detect their activities,” Microsoft notes.

The campaign operators then attempt to steal credentials to elevate privileges and sometimes create new accounts and grant Remote Desktop privileges to them, for persistence. They also perform reconnaissance, search for active RDP sessions, query Active Directory or LDAP, and target high-impact machines.

Similarly, the Ryuk human-operated ransomware family is being deployed by a banking Trojan, in this case Trickbot. The Cobalt Strike implant or PowerShell Empire are employed for lateral movement, with the ransomware often deployed weeks or months after the initial infection.

The same as PARINACOTA and the Doppelpaymer operators, the Ryuk gang leverages local administrator accounts, attempts to disable security tools, performs reconnaissance and lateral movement, and attempts to steal credentials for high-privilege accounts. The ransomware is often deployed weeks or months following the initial intrusion.

Successful human-operated ransomware attacks target servers with security software disabled to improve performance, and many use already known malware and tools. In such campaigns, Microsoft says, attackers maintain access to the network even if the ransom is paid.

“The same servers also often lack firewall protection and MFA, have weak domain credentials, and use non-randomized local admin passwords. Oftentimes these protections are not deployed because there is a fear that security controls will disrupt operations or impact performance,” Microsoft says.

Removing the adversary’s ability to move laterally would significantly increase resilience against Wadhrama, Doppelpaymer, Ryuk, Samas, REvil, and other human-operated attacks. Credential hygiene and stopping unnecessary communication between endpoints should also help, especially if coupled with the use of advanced protection on multiple attack surfaces.

Related: Legal Services Firm Epiq Hit by Ransomware

Related: Operations at U.S. Natural Gas Facilities Disrupted by Ransomware Attack

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...