LockBit: attackers use alternative ransomware as a fallback
The emerging threat: 3AM ransomware spreads as an alternative option to security locks
According to threat researchers at Symantec, attackers are using the 3AM ransomware as a fallback option in case LockBit is detected and blocked. Even though security solutions might prevent a LockBit infection, you may still end up with encrypted files. The 3AM ransomware, named for the .threeamtime extension added to encrypted files, is a new variant written in Rust that attempts to terminate security and backup software on the infected computer. Although it has only been used in a limited attack, this ransomware may circulate again in the future.
3AM's modus operandi
According to researchers' analysis, 3AM tries to erase Shadow Volume copies after encrypting the target files and deleting the original ones. However, it doesn't seem effective or stealthy enough to go unnoticed. The attackers attempted to deploy it on three machines on a corporate network, but only one of them managed to escape the security locks. Before encrypting the files, the attackers also exfiltrated the data, leaving open the possibility of further extorting the victim organization.
Attack methods used by attackers
It was not specified how the first system was compromised. However, Symantec researchers have spotted some suspicious hacker activity. These include using the "gpresult" command to dump the policy settings applied to the computer for a specified user. The attackers also ran components of Cobalt Strike and attempted to escalate privileges using “PsExec.” Next, they ran reconnaissance operations with commands like “whoami,” “netstat,” “quser,” and “net share,” and enumerated other servers they could access via “quser” and “net view.” Finally, they added a new user to ensure persistence and sent the victims' files to their FTP server via the "Wput" tool.
Indicators of compromise provided by Symantec
Symantec provided some indicators of compromise, including IP addresses and file hashes for the two malware variants and the Cobalt Strike recalls. It's important to keep track of these clues so you can implement the necessary security measures to detect and mitigate potential attacks.
Follow us on Threads for more pills like this09/14/2023 11:09
Marco Verro