Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Royal Ransomware Made Upto $11 Million USD Using Custom-Made Encryption Malware

admin by admin
Mar 6, 2023
in News
A A
0

The collaborative efforts of the FBI and CISA have resulted in the creation and distribution of a comprehensive Cybersecurity Advisory (CSA) revealing that the threat actors behind the Rayal ransomware made up to $11 million in Crypto.

This advisory has been designed to share crucial information on the Royal ransomware threat and its associated IOCs and TTPs. 

The FBI’s dedicated threat response activities have identified these IOCs and TTPs recently in January 2023, and the CSA aims to share this information to help organizations protect themselves against this malicious threat.

A new variant of Royal ransomware has been used by cybercriminals to breach the security of both US-based and foreign organizations since around September 2022.

EHA

The FBI and CISA believe that the custom-built file encryption program utilized by a particular ransomware variant is an evolved version of previous iterations that employed a loader known as “Zeon.”

Action Flow

The modus operandi of the Royal ransomware involves disabling the antivirus software of targeted organizations after breaching their network security. 

As a result, considerable amounts of data are exfiltrated by attackers prior to the final deployment of the ransomware and encryption of the computers that are affected.

The operators of the Royal ransomware have demanded payment of a ransom in Bitcoin from their victims. These ransom demands have varied between roughly $1 million and $11 million USD, depending on the targeted organization’s size and level of sensitivity of the stolen data.

Based on recorded incidents, it has been observed that the perpetrators behind the Royal ransomware do not provide ransom amounts and payment details in their initial ransom notes. 

Instead, they engage in direct negotiations with the victims through a .onion URL after gaining their attention via the ransom note.

Critical Infrastructure Sectors Targeted

The Royal ransomware has specifically aimed at compromising a broad range of critical infrastructure sectors, which include:-

  • Manufacturing
  • Communications
  • Healthcare and Public Healthcare (HPH)
  • Education

Technical Analysis

Aside from the primary function of encrypting data, the individuals behind the Royal ransomware have also employed double extortion tactics.

While the Royal ransomware operators employ multiple techniques to gain initial access to their target networks, which include:-

  • Phishing
  • Remote Desktop Protocol (RDP)
  • Public-facing applications
  • Brokers

After successfully breaching a target network, the perpetrators establish communication with their C2 infrastructure. Subsequently, they download several tools to execute their attack strategy on the compromised systems.

The attackers have repurposed valid Windows software to their advantage in strengthening their foothold in the targeted network. They utilize this technique to evade detection by security protocols and to facilitate a further compromise of the victim’s network.

Recent observations have indicated that the perpetrators of the Royal ransomware have begun to use Chisel, as a means of communicating with their command and control (C2) infrastructure. 

The Royal ransomware operators have employed several command-and-control (C2) servers that have previously been linked to Qakbot malware in their attacks. However, it is not yet clear if the Royal ransomware exclusively relies on the Qakbot infrastructure for its operations.

In accordance with their further compromising step, threat actors move laterally across the network with the help of RDP or RMM tools like:-

  • AnyDesk
  • LogMeIn
  • Atera  

Afterward, they use pen-testing and malware tools in order to exfiltrate data from victim networks, such as:-

The Cobalt Strike program is subsequently repurposed for the purposes of aggregating and exfiltrating data.

During the month of January 2023, the Royal ransomware was reportedly associated with 19 attacks, placing it behind other ransomware families such as:- 

Recent reports indicate that Royal ransomware has advanced its capabilities and can now target both Windows and Linux environments. This suggests that the attackers are adapting and evolving their tactics to expand the scope of their attacks.

While this expanded capability could potentially lead to a wider range of targets for the attackers to compromise.

Network Security Checklist – Download Free E-Book

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.