Brain Cipher Ransomware is a variant of the LockBit ransomware family that has recently emerged in the Indonesian cybersecurity landscape.
Brain Cipher ransomware group gained widespread attention following a high-profile attack on Indonesia's National Data Center (Pusat Data Nasional - PDN) on June 20 2024, which led to the disruption of essential public services, including immigration.
In their statement published on July 2, 2024, the group emphasized that their attack was a demonstration of the importance of financing the cybersecurity industry and recruiting qualified specialists, asserting that their actions were not politically motivated but rather a form of post-payment penetration testing.
The group has kept its promise and made decryption keys available at no cost, enabling victims to restore their encrypted data without needing to pay a ransom.
Screenshot source: X
The ransomware group has previously shown a preference for targeting organizations within Southeast Asia, particularly Indonesia. However, with their recent attacks on victims in the US and Israel, it is evident that their operations are expanding beyond this region.
Brain Cipher Ransomware has primarily targeted the public sector, with a specific focus on critical infrastructure. They have recently expanded their attacks to include the finance and manufacturing sectors. The attack on the PDN demonstrated the group's ability to disrupt vital services, causing widespread chaos and impacting public safety.
Brain Cipher Ransomware has primarily targeted the public sector, with a specific focus on critical infrastructure. They have recently expanded their attacks to include the finance and manufacturing sectors. The attack on the PDN demonstrated the group's ability to disrupt vital services, causing widespread chaos and impacting public safety.
The most notable victim of Brain Cipher Ransomware to date is the Pusat Data Nasional (PDN) in Indonesia. This attack led to the disruption of immigration services and other public services, affecting 210 institutions. The full extent of the group's victimology remains under investigation.
Stats source: ransomware.live
Brain Cipher Ransomware gains initial access through phishing campaigns. Deceptive emails trick recipients into downloading and executing malicious files.
The ransomware bypasses User Account Control (T1548.002) to gain elevated privileges within the targeted systems.
Similar to its privilege escalation techniques, it bypasses User Account Control (T1548.002) to avoid detection by security systems.
Brain Cipher steals web session cookies (T1539), credentials from web browsers (T1555.003), and credentials stored in files (T1552.001) to further infiltrate the network.
Brain Cipher performs system information discovery (T1082), queries the registry (T1012), and discovers installed software (T1518) to map out the infected environment.
The ransomware moves laterally within the network to maximize its impact, though specific techniques for this stage are not detailed.
It collects sensitive information from the infected systems, preparing for potential data exfiltration.
Brain Cipher uses Windows Command Shell (T1059.003) and user execution of malicious files (T1204.002) to run its payloads.
Engages in double extortion by exfiltrating sensitive data and threatening to release it publicly if the ransom is not paid.
The primary impact tactic is data encryption for impact (T1486), rendering the victim's data inaccessible until the ransom is paid.
Brain Cipher Ransomware gains initial access through phishing campaigns. Deceptive emails trick recipients into downloading and executing malicious files.
The ransomware bypasses User Account Control (T1548.002) to gain elevated privileges within the targeted systems.
Similar to its privilege escalation techniques, it bypasses User Account Control (T1548.002) to avoid detection by security systems.
Brain Cipher steals web session cookies (T1539), credentials from web browsers (T1555.003), and credentials stored in files (T1552.001) to further infiltrate the network.
Brain Cipher performs system information discovery (T1082), queries the registry (T1012), and discovers installed software (T1518) to map out the infected environment.
The ransomware moves laterally within the network to maximize its impact, though specific techniques for this stage are not detailed.
It collects sensitive information from the infected systems, preparing for potential data exfiltration.
Brain Cipher uses Windows Command Shell (T1059.003) and user execution of malicious files (T1204.002) to run its payloads.
Engages in double extortion by exfiltrating sensitive data and threatening to release it publicly if the ransom is not paid.
The primary impact tactic is data encryption for impact (T1486), rendering the victim's data inaccessible until the ransom is paid.
This list of TTPs is not exhaustive as we are still working to fully understand the behavior of Brain Cipher; it will be updated regularly as we gather more information.
Source: Peris.ai
List of the Detections available in the Vectra AI Platform that would indicate a ransomware attack.
Brain Cipher is a ransomware group known for targeting large organizations and causing significant disruptions through data encryption and ransom demands.
The group primarily uses phishing campaigns to trick victims into downloading and executing malicious files.
Public sector organizations and critical infrastructure are at high risk, as evidenced by the attack on Indonesia's National Data Center.
Implementing phishing awareness training, using advanced endpoint protection, and maintaining up-to-date security patches can help mitigate the risk.
It bypasses User Account Control and uses legitimate system tools like Windows Command Shell to avoid detection.
Isolate the affected systems, notify law enforcement, and consult with cybersecurity experts before considering ransom payment.
Yes, Brain Cipher employs double extortion by exfiltrating data and threatening to release it if the ransom is not paid.
The attack disrupted immigration services and affected 210 institutions, highlighting the ransomware's capacity for large-scale impact.
XDR solutions provide comprehensive threat detection and response capabilities, helping to identify and mitigate ransomware attacks like those conducted by Brain Cipher.
Brain Cipher Ransomware share several similarities with LockBit 3.0, such as their advanced encryption techniques and double extortion strategies.