• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Researchers Uncover New “RA Group” Ransomware

You are here: Home / General Cyber Security News / Researchers Uncover New “RA Group” Ransomware
May 16, 2023

Danger scientists have found out an additional new ransomware actor, this time leveraging Babuk supply code in attacks on US and South Korean businesses.

RA Team emerged in April this calendar year, with a dedicated leak internet site appearing at the finish of the month listing exfiltrated info, target URLs and other data, according to Cisco Talos. The team is also advertising exfiltrated knowledge, which is hosted on a Tor web-site.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Study far more on Babuk: Menace Actors Use Babuk Code to Develop Hypervisor Ransomware.

Cisco warned that the team is ramping up activity rapidly, with 3 US victims and one particular in South Korea across producing, prosperity administration, insurance suppliers and pharmaceuticals sectors.

As is standard for this sort of teams, ransom notes are crafted into the code and individualized for just about every target firm. Nevertheless, RA Group is unusual in also naming the sufferer in the executable, the report observed.

Each the debug path and the fact that the ransomware has the exact same mutex as Babuk supports Cisco’s assessment that the team is applying the Babuk source code, which was leaked again in September 2021.

The executable alone uses curve25519 and eSTREAM cipher hc-128 algorithms, but only partly encrypts information in order to accelerate the course of action, Cisco claimed. As soon as done, a “.Gagup” extension is utilized and all recycle bin and quantity shadow copies of knowledge are deleted.

Nevertheless, RA Group doesn’t encrypt all information and folders, leaving some untouched so that victim businesses can “download the qTox application and contact RA Team operators applying the qTox ID supplied on the ransom observe.”

Just after analyzing former ransom notes, Cisco asserted that victims get 3 days to get in touch with their extorters, after which time RA Team starts to leak their data files.

“The victims can ensure the exfiltration of their details by downloading a file applying the gofile[.]io url in the ransom notice,” it explained.

There is no information as a result significantly on how the team gains original obtain or conducts post-intrusion exercise.


Some pieces of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News PharMerica Breach Hits Over 5.8 Million Customers
Next Post: CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules copperstealer malware crew resurfaces with new rootkit and phishing kit»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.