اپراتورهای باج افزار کوبا “به دست آورده” $ 44 میلیون

Officials from the Federal Bureau of Investigation (FBI) say Cuba ransomware operators earned at least $ 43.9 million this year.

In an emergency warning released the other day, را FBI writes that the Cuba group hascompromised at least 49 organizations in five critical infrastructure sectors, including the financial and public sector, healthcare, manufacturing and IT.

Law enforcement officials say they tracked Cuba’s attacks on systems infected with the Hancitor بد افزار, که از ایمیل های فیشینگ استفاده می کند, اعتبار به خطر افتاده, or brute-forcing RDP to access vulnerable Windows machines and exploits vulnerabilities in مایکروسافت Exchange. After Hancitor is infected, access to such a system is leased to other hackers using the Malware-as-a-Service model.

Cuba ransomware, upon compromise, installs and executes a CobaltStrike beacon as a service on the victim’s network via PowerShell. Once installed, the ransomware downloads two executable files, which include “pones.exe” for password acquisition and “krots.exe,” also known as KPOT, enabling the Cuba ransomware actors to write to the compromised system’s temporary (TMP) file. Further, Cuba ransomware actors use MimiKatz malware to steal credentials, and then use RDP to log into the compromised network host with a specific user account.FBI information security experts told.

While a McAfee report on Cuba last year found no link between the two groups, the FBI document says that now there appears to be a new partnership between the MaaS vendor and the ransomware. The published FBI document describes how a typical Hancitor-to-Cuba infection occurs and lists indicators of compromise.

The Record writes that before encrypting the victimsdata, Cuba operators steal information and then threaten to publish these files on their website on the darknet if the victim does not pay the ransom. According to data compiled by analysts at آینده ثبت شده, the site has already listed 28 companies that have refused to pay.

The FBI said the $ 43.9 million was just actual payments to the victims, but initially the hackers demanded more than $ 74 million from the victims, but some refused to pay.

یادآوری می کنم که ما هم آن را گزارش کردیم Hive ransomware infected by MediaMarkt and its operators demand $ 240 میلیون.

هلگا اسمیت

من همیشه به علوم کامپیوتر علاقه داشتم, به خصوص امنیت داده ها و موضوع, که امروزه نامیده می شود "علم داده", از اوایل نوجوانی من. قبل از ورود به تیم حذف ویروس به عنوان سردبیر, من به عنوان کارشناس امنیت سایبری در چندین شرکت کار کردم, از جمله یکی از پیمانکاران آمازون. یک تجربه دیگر: من در دانشگاه های آردن و ریدینگ تدریس می کنم.

پاسخ دهید

این سایت از Akismet برای کاهش هرزنامه استفاده می کند. با نحوه پردازش داده های نظر خود آشنا شوید.

دکمه بازگشت به بالا