RansomHub

RansomHub is a ransomware-as-a-service (RaaS) variant, previously known as Cyclops and Knight.

Is Your Organization Safe from RansomHub Attacks?

The Origin of RansomHub

Emerging in February 2024, the group has encrypted and exfiltrated data from over 210 victims, leveraging high-profile affiliates from other ransomware groups such as LockBit and ALPHV. RansomHub's operation focuses on a double extortion model, where affiliates encrypt systems and exfiltrate data, threatening to publish stolen data if ransoms are not paid. The group is known for its professionalism and technical sophistication.

Targets

RansomHub's Targets

Countries targeted by RansomHub

RansomHub has a global reach, with victims primarily in the United States and Europe, focusing on critical infrastructure and key industries.

The group claims to avoid targeting the Commonwealth of Independent States (CIS), Cuba, North Korea, and China, likely due to operational safe havens or legal protections.

Figure source: Cyberint

Industries targeted by RansomHub

RansomHub targets a broad range of industries, with the top sectors being Business Services, Retail, and Manufacturing. Other industries frequently impacted include Educational Services, Government, Finance, Construction, Healthcare, Technology, and Critical Infrastructures. The group's focus on critical sectors highlights its broad operational scope, posing a significant threat to both public and private entities.

Despite the group's efficiency, they claim not to target non-profit organizations.

Industries targeted by RansomHub

RansomHub targets a broad range of industries, with the top sectors being Business Services, Retail, and Manufacturing. Other industries frequently impacted include Educational Services, Government, Finance, Construction, Healthcare, Technology, and Critical Infrastructures. The group's focus on critical sectors highlights its broad operational scope, posing a significant threat to both public and private entities.

Despite the group's efficiency, they claim not to target non-profit organizations.

RansomHub's Victims

Over 324 organizations have fallen victim to RansomHub since its emergence, with a notable focus on public infrastructure, including healthcare systems and government facilities. These attacks disrupt vital services, leading to significant operational downtimes and substantial ransom demands.

Attack Method

RansomHub's Attack Method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

RansomHub affiliates gain access through phishing emails, exploiting vulnerabilities, and password spraying. Common vulnerabilities exploited include CVE-2023-3519 (Citrix ADC), CVE-2023-27997 (Fortinet), and CVE-2020-1472 (Netlogon privilege escalation).

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

Once inside, affiliates escalate privileges using tools like Mimikatz, enabling full control over compromised systems.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

They disable security tools, clear logs, and rename ransomware executables to blend into system files, evading detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Using credential dumping tools and password spraying, affiliates gather administrative credentials to access high-value systems.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

Network reconnaissance is conducted using tools like Nmap and PowerShell to identify valuable targets and plan further exploitation.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Affiliates move laterally using tools like Remote Desktop Protocol (RDP), PsExec, and AnyDesk, gaining access to additional systems within the network.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

Sensitive data is exfiltrated using tools like Rclone and WinSCP, often for double extortion purposes, where the stolen data is used as leverage in ransom negotiations.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

The ransomware is executed across the victim’s network, encrypting files using Curve 25519 elliptic-curve encryption.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Data is exfiltrated through encrypted protocols, cloud accounts, or direct transfers to attacker-controlled servers.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

RansomHub’s encryption renders victim systems inoperable, often leading to extensive operational downtime. Affiliates delete backups and volume shadow copies to prevent recovery efforts, maximizing the pressure on victims to pay the ransom.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

RansomHub affiliates gain access through phishing emails, exploiting vulnerabilities, and password spraying. Common vulnerabilities exploited include CVE-2023-3519 (Citrix ADC), CVE-2023-27997 (Fortinet), and CVE-2020-1472 (Netlogon privilege escalation).

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

Once inside, affiliates escalate privileges using tools like Mimikatz, enabling full control over compromised systems.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

They disable security tools, clear logs, and rename ransomware executables to blend into system files, evading detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Using credential dumping tools and password spraying, affiliates gather administrative credentials to access high-value systems.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

Network reconnaissance is conducted using tools like Nmap and PowerShell to identify valuable targets and plan further exploitation.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Affiliates move laterally using tools like Remote Desktop Protocol (RDP), PsExec, and AnyDesk, gaining access to additional systems within the network.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

Sensitive data is exfiltrated using tools like Rclone and WinSCP, often for double extortion purposes, where the stolen data is used as leverage in ransom negotiations.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

The ransomware is executed across the victim’s network, encrypting files using Curve 25519 elliptic-curve encryption.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Data is exfiltrated through encrypted protocols, cloud accounts, or direct transfers to attacker-controlled servers.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

RansomHub’s encryption renders victim systems inoperable, often leading to extensive operational downtime. Affiliates delete backups and volume shadow copies to prevent recovery efforts, maximizing the pressure on victims to pay the ransom.

MITRE ATT&CK Mapping

TTPs used by RansomHub

TA0001: Initial Access
T1566
Phishing
T1190
Exploit Public-Facing Application
TA0002: Execution
T1059
Command and Scripting Interpreter
TA0003: Persistence
No items found.
TA0004: Privilege Escalation
No items found.
TA0005: Defense Evasion
T1562
Impair Defenses
TA0006: Credential Access
T1003
OS Credential Dumping
TA0007: Discovery
No items found.
TA0008: Lateral Movement
T1021
Remote Services
TA0009: Collection
No items found.
TA0011: Command and Control
No items found.
TA0010: Exfiltration
T1048
Exfiltration Over Alternative Protocol
TA0040: Impact
T1486
Data Encrypted for Impact

FAQs

What industries does RansomHub primarily target?

RansomHub attacks critical infrastructure sectors such as healthcare, financial services, and government facilities.

What countries are most affected by RansomHub?

The group primarily targets organizations in the United States and Europe, avoiding CIS countries, Cuba, North Korea, and China.

How does RansomHub gain initial access?

Affiliates exploit known vulnerabilities, use phishing attacks, and leverage stolen credentials to infiltrate systems.

What are RansomHub's data exfiltration methods?

They use tools like Rclone and WinSCP to exfiltrate sensitive data over encrypted channels.

How does RansomHub escalate privileges within a network?

Affiliates use tools like Mimikatz to extract credentials and escalate to system-level privileges.

What encryption method does RansomHub use?

RansomHub affiliates use Curve 25519 elliptic-curve encryption to lock victims’ files.

How do RansomHub affiliates avoid detection?

They disable security tools, clear logs, and rename ransomware executables to blend in with legitimate files.

What tools does RansomHub use for lateral movement?

Tools like Remote Desktop Protocol (RDP), AnyDesk, and PsExec are used for moving laterally within compromised networks.

What mitigation strategies can help prevent RansomHub attacks?

Implementing phishing-resistant multi-factor authentication (MFA), patching vulnerabilities, and segmenting networks are key mitigation strategies.

What is the impact of a RansomHub attack?

Victims often experience significant downtime and data loss due to encryption and the deletion of backups, leading to operational paralysis and high ransom demands.