• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Researchers Uncover New “RA Group” Ransomware

You are here: Home / General Cyber Security News / Researchers Uncover New “RA Group” Ransomware
May 16, 2023

Danger scientists have found out an additional new ransomware actor, this time leveraging Babuk supply code in attacks on US and South Korean businesses.

RA Team emerged in April this calendar year, with a dedicated leak internet site appearing at the finish of the month listing exfiltrated info, target URLs and other data, according to Cisco Talos. The team is also advertising exfiltrated knowledge, which is hosted on a Tor web-site.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Study far more on Babuk: Menace Actors Use Babuk Code to Develop Hypervisor Ransomware.

Cisco warned that the team is ramping up activity rapidly, with 3 US victims and one particular in South Korea across producing, prosperity administration, insurance suppliers and pharmaceuticals sectors.

As is standard for this sort of teams, ransom notes are crafted into the code and individualized for just about every target firm. Nevertheless, RA Group is unusual in also naming the sufferer in the executable, the report observed.

Each the debug path and the fact that the ransomware has the exact same mutex as Babuk supports Cisco’s assessment that the team is applying the Babuk source code, which was leaked again in September 2021.

The executable alone uses curve25519 and eSTREAM cipher hc-128 algorithms, but only partly encrypts information in order to accelerate the course of action, Cisco claimed. As soon as done, a “.Gagup” extension is utilized and all recycle bin and quantity shadow copies of knowledge are deleted.

Nevertheless, RA Group doesn’t encrypt all information and folders, leaving some untouched so that victim businesses can “download the qTox application and contact RA Team operators applying the qTox ID supplied on the ransom observe.”

Just after analyzing former ransom notes, Cisco asserted that victims get 3 days to get in touch with their extorters, after which time RA Team starts to leak their data files.

“The victims can ensure the exfiltration of their details by downloading a file applying the gofile[.]io url in the ransom notice,” it explained.

There is no information as a result significantly on how the team gains original obtain or conducts post-intrusion exercise.


Some pieces of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News PharMerica Breach Hits Over 5.8 Million Customers
Next Post: CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules copperstealer malware crew resurfaces with new rootkit and phishing kit»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.