• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
evil corp cybercrime group shifts to lockbit ransomware to evade

Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions

You are here: Home / General Cyber Security News / Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions
June 7, 2022

The threat cluster dubbed UNC2165, which shares several overlaps with a Russia-based mostly cybercrime group regarded as Evil Corp, has been linked to various LockBit ransomware intrusions in an endeavor to get all over sanctions imposed by the U.S. Treasury in December 2019.

“These actors have shifted absent from working with distinctive ransomware variants to LockBit — a nicely-identified ransomware as a provider (RaaS) — in their operations, probably to hinder attribution efforts in buy to evade sanctions,” threat intelligence organization Mandiant famous in an investigation past week.

Lively given that 2019, UNC2165 is known to acquire first obtain to target networks by way of stolen credentials and a JavaScript-based mostly downloader malware identified as FakeUpdates (aka SocGholish), leveraging it to beforehand deploy Hades ransomware.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

Hades is the perform of a economically determined hacking group named Evil Corp, which is also termed by the monikers Gold Drake and Indrik Spider and has been attributed to the notorious Dridex (aka Bugat) trojan as effectively as other ransomware strains these types of as BitPaymer, DoppelPaymer, and WastedLocker around the previous five yrs.

UNC2165’s pivot from Hades to LockBit as a sanctions-dodging tactic is stated to have happened in early 2021.

Curiously, FakeUpdates has also, in the earlier, served as the initial an infection vector for distributing Dridex that then was used as a conduit to drop BitPaymer and DoppelPaymer on to compromised programs.

Mandiant mentioned it observed additional similarities in between UNC2165 and an Evil Corp-linked cyber espionage activity tracked by Swiss cybersecurity agency PRODAFT less than the identify SilverFish aimed at government entities and Fortune 500 organizations in the E.U and the U.S.

A prosperous original compromise is adopted by a string of steps as part of the attack lifecycle, including privilege escalation, inner reconnaissance, lateral movement, and retaining very long-time period remote access, prior to providing the ransomware payloads.

With sanctions utilised as a signifies to rein in ransomware attacks, in switch barring victims from negotiating with the risk actors, including a ransomware group to a sanctions record — devoid of naming the individuals driving it — has also been complicated by the simple fact that cybercriminal syndicates frequently tend to shutter, regroup, and rebrand underneath a distinctive identify to circumvent law enforcement.

CyberSecurity

“The adoption of an present ransomware is a natural evolution for UNC2165 to endeavor to obscure their affiliation with Evil Corp,” Mandiant claimed, though also making certain that sanctions are “not a restricting factor to acquiring payments from victims.”

“Making use of this RaaS would let UNC2165 to blend in with other affiliates, the corporation included, stating, “it is plausible that the actors behind UNC2165 functions will continue to consider further steps to distance themselves from the Evil Corp name.”

The conclusions from Mandiant, which is in the procedure of remaining acquired by Google, are specially considerable as the LockBit ransomware gang has since alleged that it had breached into the company’s network and stole delicate information.

The group, past threatening to launch “all obtainable info” on its info leak portal, did not specify the precise nature of the contents in individuals documents. However, Mandiant reported there is no evidence to aid the assert.

“Mandiant has reviewed the knowledge disclosed in the preliminary LockBit launch,” the business explained to The Hacker News. “Based mostly on the knowledge that has been released, there are no indications that Mandiant facts has been disclosed but somewhat the actor seems to be trying to disprove Mandiant’s June 2, 2022 investigate on UNC2165 and LockBit.”

Found this posting intriguing? Abide by THN on Fb, Twitter  and LinkedIn to go through extra exceptional content we submit.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «follina exploited by state sponsored hackers Follina Exploited by State-Sponsored Hackers
Next Post: Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.