A new ransomware threat actor has been detected targeting big businesses in hopes of equally large payouts.
Cybersecurity researchers from Talos uncovered a threat actor called RA Group which kicked off its operations in April 2023 using the Babuk source code, which was previously leaked, apparently by one of its former members.
So far, the group has successfully attacked three organizations in the US, and one in South Korea. It doesn’t seem to have an industry preference, as the victims were in manufacturing, wealth management, insurance, and pharmacy.
Personalized ransom notes
There’s nothing particularly unique about RA Group. It launches double extortion attacks, stealing sensitive data as it encrypts the systems, in hopes of motivating the victims to pay the ransom demand. Its website seems to be a work in progress, as the group is still making cosmetic changes. When it leaks the data, it discoses the name of the victim, a list of the stolen data, the total size, and the victim’s website.
The ransom note is personalized for each individual victim, the researchers added, claiming this, too, is standard practice among ransomware threat actors. What isn’t standard practice, however, is naming the victims in the executables, as well.
The malware encrypts only parts of files, in order to move faster. After the encryption is complete, the files get the .GAGUP extension. The ransomware then deletes everything in the Bin with the API SHEmptyRecyclebinA, as well as volume shadow copy by executing the local Windows binary vssadmin.exe, an administrative tool used to manipulate shadow copies.
The ransomware does not encrypt all files, though. Some are left accessible so that the victims can contact the group easier. The non-encrypted files are necessary for the victims to download the qTox application, used to reach out to the attackers.
- These are the best malware removal tools right now
Go to Source