Researchers uncover Ransom Cartel linked to REvil ransomware

Share post:

Security researchers from Unit 42 of the Palo Alto network have uncovered Ransom Cartel, a ransomware operation that bears similarities to the notorious REvil ransomware.

According to the researchers, the two cybercrime gangs have similarities in techniques, tactics and procedures (TTPs). They so share common ground in the code of their malware.

There is a tendency to assume Ransom Cartel is an offshoot of REvil, since the source code of REvil’s encrypting malware was never leaked on hacking forums. Therefore, any project using similar code is either a rebrand or a new operation launched by a core member of the original gang.

Both operations have similar encryption similarities with Ransom Cartel’s samples generating multiple pairs of public/private keys and session secrets similar to those of REvil.

Ransom Cartel and REvil also have similarities in the tactics, techniques and procedures (TTPs) used including double-extortion attacks, large ransom demands and a data leak site to pressure victims into paying a ransom.

Despite the similarities, the Ransom Cartel samples do not feature REvil’s strong obfuscation which could mean that the authors of the new malware are not in possession of REvil’s original obfuscation engine.

Unlike REvil, RansomCartel uses the Windows Data Protection API (DPAPI) technique to steal access data. This technique essentially involves using a tool called “DonAPI,” which can search hosts for DPAPI blobs containing Wi-Fi keys, RDP passwords and credentials saved in web browsers and then download and decrypt them locally on the machine.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways