• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new ransomware gang ra group hits u.s. and south korean

New Ransomware Gang RA Group Hits U.S. and South Korean Organizations

You are here: Home / General Cyber Security News / New Ransomware Gang RA Group Hits U.S. and South Korean Organizations
May 15, 2023

A new ransomware group recognized as RA Group has become the latest risk actor to leverage the leaked Babuk ransomware source code to spawn its individual locker variant.

The cybercriminal gang, which is said to have been functioning since at the very least April 22, 2023, is rapidly growing its functions, according to cybersecurity firm Cisco Talos.

“To date, the group has compromised three corporations in the U.S. and 1 in South Korea across quite a few business enterprise verticals, which includes manufacturing, wealth management, insurance coverage suppliers and pharmaceuticals,” security researcher Chetan Raghuprasad explained in a report shared with The Hacker News.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


RA Group is no diverse from other ransomware gangs in that it launches double extortion attacks and runs a day leak site to implement added tension on victims into paying out ransoms.

Cybersecurity

The Windows-based binary employs intermittent encryption to velocity up the approach and evade detection, not to point out delete quantity shadow copies and contents of the machine’s Recycle Bin.

“RA Group uses customized ransom notes, like the victim’s identify and a one of a kind website link to obtain the exfiltration proofs,” Raghuprasad spelled out. “If the target fails to contact the actors inside 3 times, the team leaks the victim’s information.”

It also takes actions to avoid encrypting process data files and folders by indicates of a really hard-coded record so that it lets the victims to obtain the qTox chat software and attain out to the operators utilizing the qTox ID presented on the ransom notice.

Ransomware

The growth arrives considerably less than a 7 days after SentinelOne disclosed that menace actors of various sophistication and abilities are increasingly adopting the Babuk ransomware code to produce a dozen variants that are capable of targeting Linux systems.

“There is a noticeable craze that actors progressively use the Babuk builder to build ESXi and Linux ransomware,” the cybersecurity firm stated. “This is notably obvious when utilised by actors with fewer sources, as these actors are less very likely to drastically modify the Babuk supply code.”

Impending WEBINARLearn to Quit Ransomware with Real-Time Safety

Sign up for our webinar and study how to halt ransomware attacks in their tracks with serious-time MFA and company account defense.

Help save My Seat!

Other ransomware actors that have adopted the Babuk resource code about the past calendar year involve AstraLocker and Nokoyawa. Cheerscrypt, a further ransomware strain centered on Babuk, has been joined to a Chinese espionage actor referred to as Emperor Dragonfly which is recognized for working short-lived ransomware techniques such as Rook, Night Sky, and Pandora.

The findings also follow the discovery of two other new ransomware strains codenamed Rancoz and BlackSuit, the latter of which is created to goal both of those Windows and VMware ESXi servers.

“The regular evolution and release of new ransomware variants highlight the innovative competencies and agility of [threat actors], indicating that they are responding to cybersecurity actions and checks currently being executed and customizing their ransomware accordingly,” Cyble stated.

Observed this article intriguing? Stick to us on Twitter  and LinkedIn to read a lot more distinctive articles we publish.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «why high tech companies struggle with saas security Why High Tech Companies Struggle with SaaS Security
Next Post: Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks industrial cellular routers at risk: 11 new vulnerabilities expose ot»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.