{"id":682,"date":"2024-08-08T17:56:23","date_gmt":"2024-08-08T17:56:23","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=682"},"modified":"2024-08-08T17:56:23","modified_gmt":"2024-08-08T17:56:23","slug":"main-initial-access-vectors-in-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2024\/08\/08\/main-initial-access-vectors-in-ransomware-attacks\/","title":{"rendered":"Main initial access vectors in ransomware attacks"},"content":{"rendered":"<h1>Overview<\/h1>\n<p>Ransomware attacks represent one of the most critical cyber threats, given the increasing number of organizations affected each month by numerous global operating groups. These attacks disrupt operations, cause reputational and informational losses, and result in significant financial detriments. The attackers aim to encrypt victims&#8217; data, demanding a ransom to restore access and threatening to distribute the information on underground forums if the payment is not made.<\/p>\n<p>Over time, initial access vectors \u2014methods attackers use to introduce malware into systems\u2014 have evolved significantly. This evolution is driven by changes in the technologies employed by organizations, the security controls implemented, and the new techniques acquired by threat actors.<\/p>\n<p>During the early rise of ransomware, initial access vectors were relatively simpler, exploiting basic security flaws, exposed credentials, or misconfigurations. A significant factor contributing to this was the greater lack of cybersecurity awareness within organizations. As this awareness has increased, attackers have gradually become more sophisticated in their operations, highlighting the crucial role of education and training in preventing cyber-attacks.<\/p>\n<p>Examples of early ransomware families are &#8220;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/reveton-ransomware-descendant-cryptxxx-discovered\"><em>Reveton<\/em><\/a>&#8221; and &#8220;<a href=\"https:\/\/www.varonis.com\/blog\/cryptolocker\"><em>CryptoLocker<\/em><\/a>,&#8221; primarily spread through phishing emails and malicious downloads from compromised websites. <em>Reveton<\/em>, for instance, disguised itself as a police warning to trick victims into paying a &#8220;<a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/threat-search?query=Trojan:Win32\/Reveton.A\">fine<\/a>&#8220;. <em>CryptoLocker<\/em>, on the other hand, was distributed via emails with malicious attachments impersonating legitimate companies, sending fake FedEx and <a href=\"https:\/\/www.proofpoint.com\/es\/threat-reference\/cryptolocker\">UPS<\/a> notifications that, when opened, infected the victim&#8217;s system and encrypted their files.<\/p>\n<p>As system defenses improved, attackers diversified their TTP (tactics, techniques, and procedures). They began using exploit kits such as <a href=\"https:\/\/www.malwarebytes.com\/blog\/threats\/angler\"><em>Angler <\/em><\/a>and <a href=\"https:\/\/www.malwarebytes.com\/blog\/threats\/nuclear\"><em>Nuclear<\/em><\/a>, which automated exploiting vulnerabilities <a href=\"https:\/\/www.infosecinstitute.com\/resources\/threat-intelligence\/the-threatening-evolution-of-exploit-kits\/\">in<\/a> <a href=\"https:\/\/unit42.paloaltonetworks.com\/unit42-understanding-angler-exploit-kit-part-2-examining-angler-ek\/\">outdated<\/a> <a href=\"https:\/\/www.keysight.com\/blogs\/en\/tech\/nwvs\/2022\/02\/25\/angler-exploit-kit-deobfuscation-and-analysis\">software<\/a>. For example, the <em>Angler<\/em> exploit <a href=\"https:\/\/www.malwarebytes.com\/blog\/threats\/angler\">kit<\/a> exploited vulnerabilities in Internet Explorer, Silverlight, and Flash Player, among others, and was known for its ability to evade security tools like Microsoft\u2019s Enhanced Mitigation Experience Toolkit (<a href=\"https:\/\/learn.microsoft.com\/es-es\/lifecycle\/products\/enhanced-mitigation-experience-toolkit-emet\">EMET<\/a>) through sophisticated obfuscation and exploitation techniques.<\/p>\n<p>Similarly, the <em>Nuclear<\/em> exploit kit was noticeable for its dynamic use <a href=\"https:\/\/www.infosecinstitute.com\/resources\/threat-intelligence\/the-threatening-evolution-of-exploit-kits\/\">of<\/a> <a href=\"https:\/\/www.keysight.com\/blogs\/en\/tech\/nwvs\/2022\/02\/25\/angler-exploit-kit-deobfuscation-and-analysis\">payloads<\/a>, adapted to evade signature-based detections and employing advanced techniques to ensure each <a href=\"https:\/\/ciberseguridadtips.com\/payload\/\">payload<\/a> was unique for every victim.<\/p>\n<p>In 2017, the ransomware &#8220;<a href=\"https:\/\/www.cloudflare.com\/es-es\/learning\/security\/ransomware\/wannacry-ransomware\/\"><em>WannaCry<\/em><\/a>&#8221; marked a significant milestone. This ransomware spread using the <a href=\"https:\/\/nordvpn.com\/es\/blog\/what-is-eternalblue\/\"><em>EternalBlue<\/em><\/a> exploit, infecting approximately 200,000 computers in 150 countries and causing an estimated of $4 billion in damages. WannaCry demonstrated the potential of ransomware attacks to cause large-scale disruptions and underscored the importance of updating systems.<\/p>\n<p>Today, the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware-as-a-service-raas\">Ransomware-as-a-Service<\/a> (RaaS) business model is the most used by criminal groups. This model features affiliate programs, where affiliates receive assistance to carry out attacks in exchange for a pre-agreed payment or a percentage of the profits from a successful compromise. According to SCILabs&#8217; analysis, this trend has increased the number of ransomware families and threat groups. It is important to note that some threat actors occasionally announce the end of their operations, only to reemerge after a few months with a new name and novel infection techniques. This indicates that the activity of these threat groups is constant.<\/p>\n<p>The following section addresses the main initial access vectors currently used by threat actors and some reasons why these vectors are exploited.<\/p>\n<h1>What are threat actors&#8217; main initial access vectors to compromise organizations?<\/h1>\n<p>Threat actors use a variety of initial access vectors to compromise organizations, adapting their TTP to exploit both technological and human vulnerabilities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-683 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/SCILABS-access-vectors-infographic-img.jpg\" alt=\"\" width=\"600\" height=\"1952\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 1 &#8211; Main Initial Access Vectors<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>The following are some of the main methods used:<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Phishing emails, <a href=\"https:\/\/www.incibe.es\/aprendeciberseguridad\/spear-phishing\">spear-phishing<\/a> and <a href=\"https:\/\/www.incibe.es\/aprendeciberseguridad\/malvertising\">malvertising<\/a><\/strong><\/h2>\n<p>Phishing emails are one of the most common techniques. Attackers send legitimate emails, deceiving users into clicking on malicious links or downloading infected attachments. These emails can be highly personalized to increase effectiveness, using spear-phishing techniques to target specific individuals within an organization. Additionally, attackers employ malvertising, placing malicious advertisements on legitimate websites or search engines to redirect users to infected pages and automatically download malware without the user\u2019s knowledge.<\/p>\n<p><strong>How does it work? <\/strong>Attackers send emails that appear to come from trustworthy sources but actually impersonate organizations. These emails contain malicious links or attachments designed to trick victims into revealing credentials or downloading malware. In the case of malvertising, malicious ads on legitimate websites redirect users to malicious pages that download malware.<\/p>\n<p><strong>Why does it happen?<\/strong> These techniques exploit social engineering, a form of psychological manipulation that preys on people&#8217;s emotions and trust. Attackers can customize emails based on information gathered about the victim, increasing the likelihood of success. In addition, by leveraging malicious ads and personalizing their campaigns during tax seasons, mortgage payments, and government processes, to name a few, threat actors have more opportunities to compromise victims.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-685 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/Captura.png\" alt=\"\" width=\"761\" height=\"475\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 2 &#8211; Example of a phishing email used by <a href=\"https:\/\/www.netskope.com\/es\/blog\/ongoing-email-campaign-spreading-globeimposter-ransomware\"><em>GlobeImposter<\/em><\/a> ransomware operators<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-686 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/2.png\" alt=\"\" width=\"429\" height=\"83\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 3 \u2013 Malvertising campaign<\/strong><\/p>\n<h2><strong>Compromised websites<\/strong><\/h2>\n<p>It is common for threat actors to use compromised websites to distribute malware and gain access to victims&#8217; systems.<\/p>\n<p><strong>How does it work?<\/strong> Attackers compromise legitimate websites by inserting malicious code into their pages. This can happen through vulnerabilities in the website&#8217;s software, such as an HTTP <a href=\"https:\/\/httpd.apache.org\/\">Apache<\/a> server, outdated plugins, or unauthorized access to the website&#8217;s administration panel due to weak passwords. Once compromised, the website can redirect visitors to malicious pages or directly download malware onto their devices without their knowledge.<\/p>\n<p><strong>Why does it happen?<\/strong> This technique is effective because users trust legitimate websites. Attackers exploit this trust to silently and massively distribute malware. Additionally, many websites do not conduct application security <a href=\"https:\/\/www.scitum.com.mx\/Servicios\/Gestion-end-to-end-de-la-seguridad-aplicativa\">testing<\/a>, leading to vulnerabilities in their source code: the lack of updates and security patches on website platforms makes them easy targets for compromise.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-687 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/3.png\" alt=\"\" width=\"447\" height=\"345\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4 \u2013 Message showed by compromised <a href=\"https:\/\/www.proofpoint.com\/au\/blog\/threat-insight\/clipboard-compromise-powershell-self-pwn\">website<\/a><\/strong><\/p>\n<h2><strong>Vulnerabilities exploiting<\/strong><\/h2>\n<p>Threat actors seek out and exploit vulnerabilities in outdated or unpatched software, especially in remote applications or those exposed to the internet.<\/p>\n<p><strong>How does it work? <\/strong>Attackers conduct reconnaissance on organizations&#8217; internet-exposed infrastructure, identifying and exploiting vulnerabilities in outdated or poorly configured software. They use or develop exploits for these vulnerabilities, gaining unauthorized access to systems.<\/p>\n<p><strong>Why does it happen?<\/strong> Many organizations do not apply security patches promptly, leaving known vulnerabilities exposed. Remote applications and internet-exposed services, such as web servers and databases, are frequent targets. Furthermore, exploit kits can quickly detect and <a href=\"https:\/\/www.eset.com\/py\/empresas\/compania\/kits-de-exploits-que-son-y-como-protegerse-de-ellos\/\">exploit<\/a> these gaps before implementing necessary updates.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-688 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/4.png\" alt=\"\" width=\"556\" height=\"424\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 5 &#8211; CVE-2022-30190, &#8220;Follina&#8221; exploit example<\/strong><\/p>\n<h2><strong>Brute Force Attacks and stolen credentials<\/strong><\/h2>\n<p>By exploiting weak or reused passwords, attackers can perform brute force attacks to gain access to user accounts. Additionally, stolen credentials from data breaches, known as data leaks or combos, are used to access corporate systems.<\/p>\n<p><strong>How does it work? <\/strong>Attackers use automated tools to try multiple combinations of usernames and passwords until they find a valid one. They may also use stolen credentials from previous data breaches.<\/p>\n<p><strong>Why does it happen?<\/strong> The reuse of passwords and the lack of robust password policies facilitate these attacks. Compromised credentials obtained through malware are often sold on underground markets, Telegram groups, or cybercriminal forums, providing attackers with a ready-made database to exploit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-689 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/5.png\" alt=\"\" width=\"599\" height=\"248\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 6 \u2013 Brute Force attack example<\/strong><\/p>\n<h2><strong>Infostealers<\/strong><\/h2>\n<p>Infostealers are a type of malware designed to steal sensitive information (such as passwords, financial data, and other personal data stored on infected devices). Threat actors use them to download and execute other threats, including ransomware.<\/p>\n<p><strong>How does it work?<\/strong> This malware is installed on the victim&#8217;s device, typically through phishing emails, malicious downloads, or by exploiting software vulnerabilities. Once installed, it collects sensitive information and sends it to the attacker without the victim&#8217;s knowledge. In some cases, it also downloads additional malware.<\/p>\n<p><strong>Why does it happen?<\/strong> The lack of EDR (Endpoint Detection and Response) tools or antivirus software, as well as the download of unverified software, facilitate infostealers to be spread. The stolen data is sold on underground markets and cybercriminal forums, providing attackers with privileged information that can be used to gain initial access and commit fraud.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-690 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/6.png\" alt=\"\" width=\"376\" height=\"94\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 7 \u2013 Fake office installer to deploy an <a href=\"https:\/\/www.avira.com\/en\/blog\/fake-office-website-drops-stealc-info-stealer\">infostealer<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Abuse of VPN, Citrix, and RDP<\/strong><\/h2>\n<p>Attackers exploit weak configurations or vulnerabilities in VPN, Citrix, and RDP services to gain unauthorized access to internal networks and sensitive data.<\/p>\n<p><strong>How does it work?<\/strong> With the increasing adoption of remote work, Remote Desktop Protocol (RDP) and other remote access technologies with poor security configurations have become key targets. Attackers look for exposed RDP, VPN, or Citrix servers and use tools that automate brute-forcing of passwords to gain entry or exploit critical vulnerabilities to access corporate networks. Once inside, they can move laterally through the network, steal data, and deploy malware. Specifically for RDP, attackers exploit misconfigured settings or weak credentials to access systems remotely.<\/p>\n<p><strong>Why does it happen? <\/strong>Misconfigurations, lack of multi-factor authentication, and the failure to promptly apply security patches facilitate these attacks. Immediate application of security patches is crucial to prevent attackers from exploiting these vulnerabilities and penetrating corporate networks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-691 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/7.png\" alt=\"\" width=\"477\" height=\"224\" \/><\/p>\n<p style=\"text-align: center\">Figure 8 &#8211; Example of RDP exploits search in Kali <a href=\"https:\/\/pentestlab.blog\/2012\/03\/26\/microsoft-rdp-vulnerability-poc\/\">Linux<\/a><\/p>\n<h2><strong>Pirated software<\/strong><\/h2>\n<p>Pirated software refers to legitimate software that has been intentionally modified to bypass licensing checks. This type of software can include backdoors or malware and is often distributed through unofficial channels or low-trust domains.<\/p>\n<p><strong>How does it work?<\/strong> The infected software is installed on users&#8217; devices, providing attackers with remote access and control over the compromised systems. This can lead to the installation of other types of malware, such as info stealers and ransomware.<\/p>\n<p><strong>Why does it happen?<\/strong> Excessive trust in software sources and the lack of independent verification of updates are key factors that allow pirated software to spread. It&#8217;s essential to independently verify updates to ensure the security of your systems and prevent the infiltration of corporate and personal systems by attackers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-692 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/8.png\" alt=\"\" width=\"332\" height=\"53\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 9 \u2013 Pirated software example<\/strong><\/p>\n<h2><strong>Supply chain attacks<\/strong><\/h2>\n<p>Attackers compromise software suppliers or third-party service providers to insert malware into legitimate software updates, affecting multiple organizations simultaneously. This attack is dangerous because it can infiltrate internal systems through a trusted channel, as seen in the SolarWinds <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\">case<\/a>.<\/p>\n<p><strong>How does it work?<\/strong> Attackers compromise software suppliers or third-party service providers to insert malware into legitimate updates distributed to multiple clients.<\/p>\n<p><strong>Why does it happen?<\/strong> Organizations often trust the integrity of their suppliers and do not independently verify software updates. This creates a backdoor that attackers can exploit to infiltrate multiple systems simultaneously.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-694 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/9.png\" alt=\"\" width=\"658\" height=\"305\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 10 \u2013 Supply chain attack example<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Exploitation of Internet of Things (<a href=\"https:\/\/aws.amazon.com\/es\/what-is\/iot\/\">IoT<\/a><\/strong><strong>) Services<\/strong><\/h2>\n<p>Attackers exploit vulnerable IoT devices, add them to <a href=\"https:\/\/www.cloudflare.com\/es-es\/learning\/ddos\/glossary\/mirai-botnet\/\">botnets<\/a>, and orchestrate various types of attacks, such as Distributed Denial of Service (<a href=\"https:\/\/www.cloudflare.com\/es-es\/learning\/ddos\/what-is-a-ddos-botnet\/\">DDoS<\/a>).<\/p>\n<p><strong>How does it work?<\/strong> Attackers look for poorly configured IoT services and devices, using tools to brute-force entry with weak passwords or by exploiting specific vulnerabilities.<\/p>\n<p><strong>Why does it happen?<\/strong> The massive adoption of remote work has increased the attack surface. Insecure configurations and the lack of multi-factor authentication in remote access services provide attackers a direct route to the organization&#8217;s internal systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-695 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/10.png\" alt=\"\" width=\"625\" height=\"336\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 11 &#8211; Framework used at times to exploit IoT in Kali <a href=\"https:\/\/kalitut.com\/routersploit\/\">Linux<\/a><\/strong><\/p>\n<h2><strong>Social engineering<\/strong><\/h2>\n<p>Social engineering methods have evolved to become more sophisticated. They include phone calls, text messages, and fake profiles on social networks to deceive employees and obtain confidential information or access to systems. Attackers may impersonate suppliers or business partners to gain the victim&#8217;s trust.<\/p>\n<p><strong>How does it work?<\/strong> Threat actors use social engineering techniques to deceive victims, including creating fake profiles on social networks, making fraudulent phone calls, and using other <a href=\"https:\/\/www.il3.ub.edu\/blog\/osint-que-es-y-tecnicas-mas-usadas\/\">OSINT <\/a>(Open Source Intelligence) methods to obtain confidential information or system access.<\/p>\n<p><strong>Why does it happen?<\/strong> Attackers exploit human psychology and trust in social interactions. The personalization and perceived authenticity of these attacks make them particularly effective.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-696 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/08\/11.png\" alt=\"\" width=\"422\" height=\"235\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 12 \u2013 Social engineering tools in Kali <a href=\"https:\/\/www.educba.com\/social-engineering-toolkit-in-kali-linux\/\">Linux<\/a><\/strong><\/p>\n<h2><strong>Insiders (Abuse of Trust)<\/strong><\/h2>\n<p>Abuse of trust refers to situations in wich an insider within an organization or system uses their position or privileged access to act harmfully. For example, an employee with access to confidential data might leak that information or intentionally deploy malware.<\/p>\n<p><strong>How does it work?<\/strong> It can manifest in various ways:<\/p>\n<ul>\n<li><strong>Unauthorized Access<\/strong>: Employees with privileged access to systems or confidential data can use their authorization for personal or malicious purposes, such as selling access on cybercriminal forums or deploying malware.<\/li>\n<li><strong>Misuse of Privileges<\/strong>: A system or network administrator can use their position to access restricted areas and make unauthorized changes.<\/li>\n<\/ul>\n<p><strong>Why does it happen?<\/strong> It is often related to the need for more internal controls within an organization.<\/p>\n<h1>Threat actors with the most activity in the region over the past year<\/h1>\n<p>According to SCILabs telemetry, the most active threat actors over the past year were <em><a href=\"https:\/\/portal.cci-entel.cl\/Threat_Intelligence\/Boletines\/1706\/\">LockBit 3.<\/a>0<\/em><em>, Akira <a href=\"https:\/\/www.checkpoint.com\/es\/cyber-hub\/threat-prevention\/ransomware\/akira-ransomware\/\">Ransomware<\/a><\/em><em>, ALPHV\/<a href=\"https:\/\/securityscorecard.com\/research\/deep-dive-into-alphv-blackcat-ransomware\/\">BlackCat<\/a><\/em><em>, Ransom <a href=\"https:\/\/www.fortinet.com\/ransomware-hub\">Hub<\/a><\/em><em>, <\/em>and<em> Qiulong <a href=\"https:\/\/cybersecuritynews.com\/new-qiulong-ransomware-emerges\/\">Ransomware<\/a><\/em>. This publication does not provide a detailed investigation of these threat groups, but it explains their initial access vectors to raise awareness about their potential dangers.<\/p>\n<h2><strong><em>LockBit 3.0<\/em><\/strong><\/h2>\n<p>The main initial access vectors used by <em>LockBit 3.0<\/em> include remote RDP connections, propagation through phishing emails, and primarily the exploitation of vulnerabilities in ProxyShell (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34473\">CVE-2021-34473<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34523\">CVE-2021-34523<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31207\">CVE-2021-31207<\/a>), PaperCut (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-27350\">CVE-2023-27350<\/a>), Apache Log4j (CVE-2021-44228), and Citrix Bleed (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-4966\">CVE-2023-4966<\/a>).<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h2><strong><em>Akira Ransomware<\/em><\/strong><a href=\"#_ftnref1\" name=\"_ftn1\"><br \/>\n<\/a><\/h2>\n<p>The operators behind this malware gain initial access to victims&#8217; environments through VPN services, particularly those lacking multi-factor authentication (MFA), or by exploiting the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20269\">CVE-2023-20269 <\/a>vulnerability present in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD), which could allow an unauthenticated remote attacker to perform a brute-force attack to guess valid username and password combinations.<a href=\"#_ftnref1\" name=\"_ftn1\"><br \/>\n<\/a><\/p>\n<p>Additionally, it has been identified that they use tools such as <a href=\"https:\/\/anydesk.com\/es\">AnyDesk<\/a>, <a href=\"https:\/\/www.winrar.es\/descargas\">WinRar<\/a> and <a href=\"https:\/\/www.majorgeeks.com\/files\/details\/pc_hunter.html\">PCHunter<\/a> during their intrusions; these tools are often used legitimately by some organizations, making their use potentially unnoticed.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h2><strong><em>ALPHV\/BlackCat<\/em><\/strong><\/h2>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p>The operators behind this malware obtain legitimate credentials from the victim organization (via phishing or purchase from underground forums) which they can use in remote access tools or when attempting to exploit vulnerabilities such as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26855\">CVE-2021-268551<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26857\">CVE-2021-268572<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26858\">CVE-2021-268583<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27065\">CVE-2021-270654<\/a>, C<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-31207\">VE-2021-312075<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-34473\">CVE-2021-344736<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34523\">CVE-2021-345237<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27876\">CVE-2021-278768<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27877\">CVE-2021-278779<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27878\">CVE-2021-27878<\/a> in the victim&#8217;s internet-exposed infrastructure to gain access to the organization.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h2><strong><em>RansomHub<\/em><\/strong><\/h2>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p>According to open <a href=\"https:\/\/securityonline.info\/ransomhubs-scada-hack-a-wake-up-call-for-industrial-cybersecurity\/\">sources<\/a>, this ransomware buys initial access brokers (<a href=\"https:\/\/www.computing.es\/opinion\/que-es-un-iab-que-peligros-conlleva\/\">IAB<\/a>), primarily of Russian origin, on Deep Web and Dark <a href=\"https:\/\/www.kaspersky.es\/resource-center\/threats\/deep-web\">Net<\/a> forums. It is hypothesized that <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/threat-intelligence\/ransomhub-knight-ransomware\"><em>RansomHub<\/em><\/a> typically purchases these accesses to infiltrate their victims&#8217; networks.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h2><strong><em>Qiulong Ransomware<\/em><\/strong><\/h2>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p>According to open <a href=\"https:\/\/thehackernews.com\/2023\/05\/inside-qilin-ransomware-affiliates-take.html\">sources<\/a>, this threat group uses phishing emails with malicious links to gain initial access.<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h1>Conclusion<\/h1>\n<p>The evolution of techniques used by threat actors to gain initial access to organizational systems underscores the critical need to stay ahead in cybersecurity. From simple phishing emails to sophisticated supply chain attacks and exploitation of remote access services, attackers&#8217; methods have evolved along with improvements in technology and security defenses.<\/p>\n<p>Understanding these initial access vectors and the factors that make them effective is essential for developing robust defense strategies. Additionally, continuous cybersecurity training, regular patches and updates, and advanced detection and response tools are fundamental to mitigating these risks. Furthermore, adopting a layered security mindset that includes prevention, detection, and response measures, can help organizations more effectively protect themselves against growing threats, including ransomware, intrusions, DDoS attacks, and data breaches.<\/p>\n<p>Cybersecurity is not just a matter of technology but also of organizational culture and resilience to attacks. Organizations must continuously improve their security posture and be prepared to effectively respond to any intrusion attempt with a proactive and adaptive approach that can significantly reduce the risk of compromise and protect the organization&#8217;s critical assets.<\/p>\n<p>We invite you to visit our blog post, &#8220;<a href=\"https:\/\/blog.scilabs.mx\/en\/recommendations-before-during-and-after-ransomware-attack\/\"><strong>Recommendations: Before, During, and After a Ransomware Incident<\/strong><\/a><strong>,<\/strong>&#8221; for key recommendations that SCILabs believes are critical for organizations to follow.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><a href=\"#_ftnref2\" name=\"_ftn2\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Ransomware attacks represent one of the most critical cyber threats, given the increasing number of organizations affected each month<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-682","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=682"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/682\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}