Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities

    justmattgBy justmattgMarch 5, 2023No Comments3 Mins Read

    [ad_1]

    Mar 03, 2023Ravie LakshmananEndpoint Security / Ransomware

    Royal Ransomware

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape last year.

    “After gaining access to victims’ networks, Royal actors disable antivirus software and exfiltrate large amounts of data before ultimately deploying the ransomware and encrypting the systems,” CISA said.

    The custom ransomware program, which has targeted U.S. and international organizations since September 2022, is believed to have evolved from earlier iterations that were dubbed Zeon.

    What’s more, it’s said to be operated by seasoned threat actors who used to be part of Conti Team One, cybersecurity company Trend Micro disclosed in December 2022.

    The ransomware group employs call back phishing as a means of delivering their ransomware to victims, a technique widely adopted by criminal groups that splintered from the Conti enterprise last year following its shutdown.

    Other modes of initial access include remote desktop protocol (RDP), exploitation of public-facing applications, and via initial access brokers (IABs).

    Ransom demands made by Royal vary from $1 million to $11 million, with attacks targeting a variety of critical sectors, including communications, education, healthcare, and manufacturing.

    “Royal ransomware uses a unique partial encryption approach that allows the threat actor to choose a specific percentage of data in a file to encrypt,” CISA noted. “This approach allows the actor to lower the encryption percentage for larger files, which helps evade detection.”

    Discover the Latest Malware Evasion Tactics and Prevention Strategies

    Ready to bust the 9 most dangerous myths about file-based attacks? Join our upcoming webinar and become a hero in the fight against patient zero infections and zero-day security events!

    RESERVE YOUR SEAT

    The cybersecurity agency said multiple command-and-control (C2) servers associated with Qakbot have been utilized in Royal ransomware intrusions, although it’s currently undetermined if the malware exclusively relies on Qakbot infrastructure.

    The intrusions are also characterized by the use of Cobalt Strike and PsExec for lateral movement, as well as relying on the Windows Volume Shadow Copy Service to delete shadow copies to prevent system recovery. Cobalt Strike is further repurposed for data aggregation and exfiltration.

    As of February 2023, Royal ransomware is capable of targeting both Windows and Linux environments. It has been linked to 19 attacks in the month of January 2023 alone, putting it behind LockBit, ALPHV, and Vice Society.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleNew FiXS ATM Malware Targeting Mexican Banks
    Next Article 3 Ways Security Teams Can Use IP Data Context
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑