By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally
Tech News

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

By Viral Trending Content 7 Min Read
Share
SHARE
RansomHub

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network’s domain controller as part of their post-compromise strategy.

“RansomHub has targeted over 600 organizations globally, spanning sectors such as healthcare, finance, government, and critical infrastructure, firmly establishing it as the most active ransomware group in 2024,” Group-IB analysts said in an exhaustive report published this week.

The ransomware group first emerged in February 2024, acquiring the source code associated with the now-defunct Knight (formerly Cyclops) RaaS gang from the RAMP cybercrime forum to speed up its operations. About five months later, an updated version of the locker was advertised on the illicit marketplace with capabilities to remotely encrypt data via SFTP protocol.

It comes in multiple variants that are capable of encrypting files on Windows, VMware ESXi, and SFTP servers. RansomHub has also been observed actively recruiting affiliates from LockBit and BlackCat groups as part of a partnership program, indicating an attempt to capitalize on the law enforcement actions targeting its rivals.

Cybersecurity

In the incident analyzed by the Singaporean cybersecurity company, the threat actor is said to have unsuccessfully attempted to exploit a critical flaw impacting Palo Alto Networks PAN-OS devices (CVE-2024-3400) using a publicly available proof-of-concept (PoC), before ultimately breaching the victim network by means of a brute-force attack against the VPN service.

“This brute force attempt was based on an enriched dictionary of over 5,000 usernames and passwords,” the researchers said. “The attacker eventually gained access through a default account frequently used in data backup solutions, and the perimeter was finally breached.”

The initial access was then abused to carry out the ransomware attack, with both data encryption and exfiltration occurring within 24 hours of the compromise.

Particularly, it involved the weaponization of two known security flaws in Active Directory (CVE-2021-42278 aka noPac) and the Netlogon protocol (CVE-2020-1472 aka ZeroLogon) to seize control of the domain controller and conduct lateral movement across the network.

“The exploitation of the above-mentioned vulnerabilities enabled the attacker to gain full privileged access to the domain controller, which is the nerve center of a Microsoft Windows-based infrastructure,” the researchers said.

“Following the completion of the exfiltration operations, the attacker prepared the environment for the final phase of the attack. The attacker operated to render all company data, saved on the various NAS, completely unreadable and inaccessible, as well as impermissible to restore, with the aim of forcing the victim to pay the ransom to get their data back.”

Another notable aspect of the attack is the use of PCHunter to stop and bypass endpoint security solutions, as well as Filezilla for data exfiltration.

“The origins of the RansomHub group, its offensive operations, and its overlapping characteristics with other groups confirm the existence of a vivid cybercrime ecosystem,” the researchers said.

“This environment thrives on the sharing, reusing, and rebranding of tools and source codes, fueling a robust underground market where high-profile victims, infamous groups, and substantial sums of money play central roles.”

The development comes as the cybersecurity firm detailed the inner workings of a “formidable RaaS operator” known as Lynx, shedding light on their affiliate workflow, their cross-platform ransomware arsenal for Windows, Linux, and ESXi environments, and customizable encryption modes.

An analysis of the ransomware’s Windows and Linux versions shows that it closely resembles INC ransomware, indicating that the threat actors likely acquired the latter’s source code.

“Affiliates are incentivized with an 80% share of ransom proceeds, reflecting a competitive, recruitment-driven strategy,” it said. “Lynx recently added multiple encryption modes: ‘fast,’ ‘medium,’ ‘slow,’ and ‘entire,’ giving affiliates the freedom to adjust the trade-off between speed and depth of file encryption.”

“The group’s recruitment posts on underground forums emphasize a stringent verification process for pentesters and skilled intrusion teams, highlighting Lynx’s emphasis on operational security and quality control. They also offer ‘call centers’ for harassing victims and advanced storage solutions for affiliates who consistently deliver profitable results.”

Top Ransomware

In recent weeks, financially motivated attacks have also been observed using the Phorpiex (aka Trik) botnet malware propagated via phishing emails to deliver the LockBit ransomware.

“Unlike the past LockBit ransomware incidents, the threat actors relied on Phorpiex to deliver and execute LockBit ransomware,” Cybereason noted in an analysis. “This technique is unique as ransomware deployment usually consists of human operators conducting the attack.”

Another significant initial infection vector concerns the exploitation of unpatched VPN appliances (e.g., CVE-2021-20038) to gain access to internal network devices and hosts and ultimately deploy Abyss Locker ransomware.

Cybersecurity

The attacks are also characterized by the use of tunneling tools to maintain persistence, as well as leveraging Bring Your Own Vulnerable Driver (BYOVD) techniques to disable endpoint protection controls.

“After gaining access into the environment and performing reconnaissance, these tunneling tools are strategically deployed on critical network devices, including ESXi hosts, Windows hosts, VPN appliances, and network attached storage (NAS) devices,” Sygnia researchers said.

Top Ransomware

“By targeting these devices, the attackers ensure robust and reliable communication channels to maintain access and orchestrate their malicious activities across the compromised network.”

The ransomware landscape – led by threat actors new and old – continues to remain in a state of flux, with attacks pivoting from traditional encryption to data theft and extortion, even as victims increasingly refuse to pay up, leading to a decline in payments in 2024.

“Groups like RansomHub and Akira now incentivize stolen data with big rewards, making these tactics quite lucrative,” cybersecurity firm Huntress said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Google Maps Free Gemini Upgrade Announced

Building Cyber Resilience in Financial Services

Inside OpenAI Power Struggles, Leadership Conflicts, Depositions & Timeline

Researcher Lifts Lid on Work to Keep Drone Technology Safe and Secure

20% Off Brooks Promo Code & Deals for November 2025

TAGGED: Cyber Security, Cybercrime, Cybersecurity, data breach, digital forensics, Incident response, Internet, Malware, Microsoft, network security, Ransomware, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article Irish Businesses Must Look East as Trump Tariffs Loom
Next Article Colorado program that helps “the most vulnerable families” with child care faces freezes amid rising costs
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Final Fantasy Publisher Plans To Offload 70 Percent Of QA Work To Generative AI
Gaming News
Escape From Tarkov 1.0 Must Reward Its Players, or Lose Them
Gaming News
Jamaica races to reopen for peak tourism season in December after Hurricane Melissa
Travel
US stocks trade lower as investors assess corporate earnings, mixed economic data
Business
비트코인 드디어 회복세… 비트코인 하이퍼, 투자할 만한 투자 종목으로 급부상
Crypto
Is Musk’s big payday make-or-break for the Tesla share price?
Business
Google Maps Free Gemini Upgrade Announced
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Final Fantasy Publisher Plans To Offload 70 Percent Of QA Work To Generative AI

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Final Fantasy Publisher Plans To Offload 70 Percent Of QA Work To Generative AI
November 6, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?