A Ransomware That Is Royal
Overview
Interestingly, they do not hire affiliates to promote their Ransomware-as-a-Service (RaaS) model. This group is mainly made up of the former members of Conti ransomware group. This fact give them experience and a solid base to carry out their extorting activities across the globe. They threatened certain critical infrastructure sectors like, manufacturing, healthcare, and education industry.
Methodology
- Callback phishing
- SEO poisoning
- Exposed Remote Desktop Protocol (RDP) accounts
- Compromised credentials
They make use of the unique partial encryption approach allowing the threat actor to choose a specific percentage of data in a file to encrypt. It helps the ransomware to evade detection and save the encryption percentage for larger files. Besides, they also go for double extortion tactics publicly threatening the release of encrypted data if the victim does not pay the ransom.
Prevention
- Mandatory strong password policies and multi-factor authentication for all critical services.
- Use updated or modern Identity and Access Management (IAM) tools.
- Employ advanced endpoint security products on all endpoints.
- Regularly update all the software and operating systems.
- Have the least privilege approach to security, including the removal of all the unnecessary access to administrative shares and other services.
- Administer a solid backup strategy including offline, encrypted, and immutable backup of data.
Comments
Post a Comment