Crypt Ghouls Launch LockBit 3.0 and Babuk Ransomware Attacks on Russian Companies

Published:

Crypt Ghouls: The Rising Threat of Ransomware Attacks on Russian Entities

In an alarming development in the realm of cybersecurity, a nascent threat actor known as Crypt Ghouls has emerged, targeting Russian businesses and government agencies with sophisticated ransomware attacks. These cybercriminals aim not only to disrupt operations but also to extract financial gain from their victims. As the digital landscape continues to evolve, the tactics employed by such groups highlight the pressing need for robust cybersecurity measures.

The Modus Operandi of Crypt Ghouls

According to Kaspersky, a leading cybersecurity firm, Crypt Ghouls employs a diverse toolkit that includes various utilities designed for infiltration and exploitation. Among the tools used are Mimikatz, XenAllPasswordPro, PingCastle, and AnyDesk, alongside the notorious ransomware variants LockBit 3.0 and Babuk. This combination of tools allows the group to execute their attacks with precision and efficiency.

Victims of these attacks span a wide range of sectors, including government agencies, mining, energy, finance, and retail companies located within Russia. The implications of these attacks are profound, as they not only threaten the financial stability of these organizations but also compromise sensitive data and disrupt essential services.

Initial Intrusion and Exploitation

Kaspersky’s investigation into these attacks revealed that the initial intrusion vector was identified in only two instances. In these cases, the threat actors exploited a contractor’s login credentials to gain access to internal systems via a VPN. This tactic underscores a critical vulnerability: the weaponization of trusted relationships. By leveraging compromised credentials from contractors, Crypt Ghouls can bypass traditional security measures and infiltrate networks undetected.

The VPN connections used in these attacks originated from IP addresses associated with a Russian hosting provider’s network, indicating a calculated effort to obscure their activities. It is believed that these contractor networks were breached through unpatched security flaws or compromised VPN services.

Tools of the Trade

Once inside the network, Crypt Ghouls employs a series of utilities to maintain remote access and facilitate further exploitation. Some of the key tools include:

  • XenAllPasswordPro: Used for harvesting authentication data.
  • Mimikatz: A well-known tool for extracting credentials from memory.
  • dumper.ps1: Utilized to dump Kerberos tickets from the Local Security Authority (LSA) cache.
  • MiniDump: Extracts login credentials from the memory of the lsass.exe process.
  • cmd.exe: Copies stored credentials from browsers like Google Chrome and Microsoft Edge.
  • PingCastle: Conducts network reconnaissance to identify vulnerabilities.
  • PAExec: Executes remote commands on compromised systems.
  • AnyDesk and resocks: Provide remote access through a SOCKS5 proxy.

The culmination of these efforts leads to the encryption of system data using publicly available versions of LockBit 3.0 for Windows and Babuk for Linux/ESXi. Notably, the attackers take additional steps to encrypt data in the Recycle Bin, making recovery efforts even more challenging for their victims.

The Ransom Note and Future Contact

As is customary in ransomware attacks, Crypt Ghouls leaves behind a ransom note that includes a link containing their ID on the Session messaging service for future communication. This method of contact not only adds a layer of anonymity for the attackers but also facilitates negotiations with the victims.

For virtual machines, the attackers connect to the ESXi server via SSH, upload the Babuk ransomware, and initiate the encryption process for the files within these environments. This multi-faceted approach to ransomware deployment illustrates the group’s technical proficiency and strategic planning.

Overlapping Threat Landscapes

Interestingly, the tools and tactics employed by Crypt Ghouls overlap with those used by other cybercriminal groups targeting Russian entities in recent months. Groups such as MorLock, BlackJack, Twelve, and ExCobalt have demonstrated similar methodologies, indicating a broader trend in the cyber threat landscape.

Kaspersky notes that cybercriminals are increasingly leveraging compromised credentials, often belonging to subcontractors, alongside popular open-source tools. This shared toolkit complicates the identification of specific hacktivist groups involved in these attacks, suggesting a collaborative environment among cybercriminals.

Conclusion: The Need for Vigilance

The emergence of Crypt Ghouls as a significant threat actor underscores the evolving nature of cybercrime, particularly in the context of ransomware attacks. As organizations continue to grapple with the implications of these attacks, the importance of robust cybersecurity measures cannot be overstated.

Investing in comprehensive security protocols, regular software updates, and employee training on recognizing phishing attempts and other social engineering tactics is essential. Furthermore, organizations must remain vigilant and proactive in monitoring their networks for unusual activity, ensuring that they are prepared to respond swiftly to potential threats.

In a world where cyber threats are becoming increasingly sophisticated, the battle for cybersecurity is far from over. The rise of groups like Crypt Ghouls serves as a stark reminder of the challenges that lie ahead and the critical need for ongoing vigilance in the face of evolving threats.


For more insights and updates on cybersecurity, follow us on Twitter and LinkedIn. Stay informed and protect your digital assets!

Related articles

Recent articles