RansomHub ransomware operation relies on a new Linux version of the encrypted to target VMware ESXi environments. <\/p>\n\n\n\n
Although RansomHub only emerged in February 2024, it has rapidly grown and has become the fourth most prolific ransomware operator over the past three months based on the number of publicly claimed attacks.
Symantec experts who analyzed the recently emerged ransomware operation\u00a0speculate that it is a rebranded version of Knight ransomware.<\/p>\n\n\n\n
Knight, also known as Cyclops 2.0, appeared in the threat landscape in May 2023. The malware targets multiple platforms, including Windows, Linux, macOS, ESXi, and Android. The operators used a double extortion model for their RaaS operation.<\/p>\n\n\n\n
Knight ransomware-as-a-service operation shut down in February 2024, and the malware\u2019s source code was likely sold to the threat actor who relaunched the RansomHub operation. RansomHub claimed responsibility for attacks against multiple organizations, including Change Healthcare,\u00a0Christie\u2019s<\/a>, and\u00a0Frontier Communications<\/a>.<\/p>\n\n\n\n
RansomHub’s affiliates have breached 45 victims across eighteen countries, mainly targeting the IT sector. The ransomware exploits cloud storage backups and misconfigured Amazon S3 instances to extort victims. Researchers at the Insikt Group also reported code similarities with ALPHV<\/a> and Knight Ransomware<\/a>, indicating potential connections.
“After processing command-line arguments and decrypting the configuration, RansomHub ESXi leverages the file \/tmp\/app.pid to check whether it is already running. If \/tmp\/app.pid does not exist, RansomHub will create it and write the process ID there. If \/tmp\/app.pid exists on startup, RansomHub will print to console \u201dalready running\u2026\u201d, read the process ID in the file, attempt to kill that process, and then exit if the process was killed.” reads the analysis<\/strong><\/a> published by Insikt Group. “If the file \/tmp\/app.pid is created with \u201c-1\u201d written inside, then the ransomware will end up in a loop trying to kill process ID \u201c-1\u201d, which should never exist, and no encryption of files or other harm to the system will take place.”<\/em><\/p>\n\n\n\n
powershell.exe -Command PowerShell -Command \"Get-VM | Stop-VM -Force\"<\/code><\/li>\n\n\n\n
Stopping IIS: cmd.exe \/c iisreset.exe \/stop<\/code><\/li>\n\n\n\n
Deleting shadow copies: powershell.exe -Command PowerShell -Command \"Get-CimInstance Win32_ShadowCopy | Remove-CimInstance\"<\/code><\/gwmw><\/gwmw><\/gwmw><\/li>\n<\/ul>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, ransomware)<\/strong><\/p>\n\n\n\n
<\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"