When Hive, LockBit, BlackCat attack one after the other

When Hive, LockBit, BlackCat attack one after the other

Share post

Multiple attacks by ransomware groups are catching on - Hive, LockBit and BlackCat ransomware gangs attack the same network one after the other. The Sophos X-Ops Active Adversary Whitepaper shows: attacked company received three different ransomware reports for triple-encrypted files.

In the current Sophos X-Ops Active Adversary Whitepaper “Multiple Attackers: A Clear and Present Danger” reports Sophos that three known ransomware groups, Hive, LockBit and BlackCat, successively attacked the same network. The first two attacks occurred within two hours, with the third attack occurring two weeks later. Each ransomware group left its own ransom note and some of the files were triple encrypted.

3-way attack provides triple encryption

"It's bad enough to receive a single ransomware alert from a cybercriminal group, let alone three," said John Shier, senior security advisor at Sophos. “Multiple attackers create a whole new level of complexity for recovery, especially when files are triple encrypted. Cybersecurity with prevention, detection and response is critical for organizations of all sizes and types – no organization is immune from attack.”

🔎 This is how a multiple attack by ransomware gangs like Hive, LockBit and BlackCat works (Image: Sophos).

The whitepaper describes other instances of overlapping cyberattacks, including cryptominers, remote access Trojans (RATs), and bots. If in the pastt multiple attackers targeting the same system, attacks typically spanned many months or years. The attacks described in the current Sophos whitepaper took place within a few days and weeks - in one case even simultaneously. Organizations are often attacked by attackers through the same vulnerable entry point into the network.

Competition and cooperation between cyber gangsters

Usually, cyber criminals compete, which makes it more difficult for multiple attackers to operate simultaneously. Mostly they eliminate their competitors on the same system. Today's RATs often point to the possibility of bot killing in criminal forums. In the attack involving the three ransomware groups, BlackCat was the last ransomware group on the system, not only deleting traces of its own activities, but also those of LockBit and Hive. In another case, a system was infected by LockBit ransomware. About three months later, members of Karakurt Team, a group with ties to Conti, managed to use the backdoor created by LockBit to steal data and demand ransom.

LockBit also allows members to collaborate

“By and large, ransomware groups do not appear to be openly hostile to one another. In fact, LockBit does not specifically prohibit its members from collaborating with competitors,” says Shier. "We have no evidence of collaboration. But it's possible for attackers to realize that in an increasingly competitive marketplace, there are only a limited number of targets to attack. Or they believe that the more pressure is applied to a target, such as multiple attacks, the more likely victims are to pay. They may have high-level discussions and make mutually beneficial agreements, such as one group encrypting the data and the other exfiltrating. At some point, these groups will have to decide whether to work together and take this approach further, or whether they want to be more competitive. But at the moment the playing field is open to multiple attacks from different groups.”

Unpatched vulnerabilities as gateways

In the attacks described in the white paper, most initial infections came from unpatched vulnerabilities. These include gaps in Log4Shell, ProxyLogon and ProxyShell or poorly configured or unsecured RDP (Remote Desktop Protocol) servers. In most cases involving multiple attackers, victims failed to effectively remediate the initial attack, leaving the door open to future cybercriminal activity. This made the same RDP misconfigurations as well as applications like RDWeb or AnyDesk an easily exploitable path for follow-up attacks. Unprotected or compromised RDP and VPN servers are among the most popular “deals” sold on the dark web.

Active Adversary Playbook

"In the current Active Adversary Playbook for 2021, Sophos is finding that businesses are being attacked simultaneously on multiple occasions and that this could be a growing trend," says Shier. "The fact that the increase in multiple attacks still has to be tracked on a case-by-case basis gives cybercriminals ample opportunity to move even further in this direction via the exploitable systems."

To learn more about multiple cyberattacks, including details on the criminal underground and practical advice on how to protect systems from such attacks, download the full Multiple Attackers: A Clear and Present Danger whitepaper from Sophos.

More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

[starboxid=USER_ID] <>ff7f00