Unique An extortionist armed with a brand new variant of MedusaLocker ransomware has contaminated greater than 100 organizations a month since no less than 2022, in response to Cisco Talos, which lately found a “substantial” Home windows credential knowledge dump that sheds gentle on the felony and their victims.
The miscreant, whom Talos has dubbed “PaidMemes,” makes use of a current MedusaLocker variant known as “BabyLockerKZ,” and inserts the phrases “paid_memes” into the malware plus different instruments used throughout the assaults.
In analysis revealed at the moment and shared solely with The Register, the risk intel group asserts, “with medium confidence,” that PaidMemes is financially motivated and dealing as an preliminary entry dealer or ransomware cartel affiliate, attacking a ton of companies arond the globe for no less than the final two years.
The extortionist’s earlier victims in October 2022 had been primarily in Europe – France, Germany, Spain, and Italy made up the majority of their exercise.
Then, throughout the second quarter of 2023, the assault quantity per 30 days almost doubled, and the main target shifted to Central and South America, with Brazil being probably the most closely focused, adopted by Mexico, Argentina, and Colombia.
‘Opportunistic’ extortionist assaults throughout industries, areas
Victims have additionally been positioned within the US, UK, Hong Kong, South Korea, Australia, and Japan, we’re advised. Talos is not revealing the precise numbers per nation, apart from to say that PaidMemes contaminated round 200 distinctive IPs per 30 days till the primary quarter of 2024. At that time, the assaults decreased.
“We’re not executed reviewing the info,” Talos head of outreach Nick Biasini advised The Register in an unique interview. “We wish to ensure that we’re not exposing anyone that might probably be a sufferer – that is a giant concern of ours.”
These victims span a number of industries, with the attacker seeming to prey closely on small and medium-sized companies, in response to Biasini, who mentioned the dumped dataset means that “no less than some portion of the ransomware panorama is extremely opportunistic.”
In a single occasion, the attacker broke into an organization with a single worker and demanded a ransom fee.
“They are not going after particular targets,” he added. “That is very opportunistic.”
The attacker is not pocketing multimillion-dollar payouts both. “These are $30,000, $40,000, $50,000 payouts that they’re getting from these small companies,” Biasini mentioned.
Whereas earlier MedusaLocker associates have damaged into sufferer environments utilizing weak Distant Desktop Protocol (RDP) configurations and phishing campaigns, it is unclear how PaidMemes positive factors entry to the compromised orgs.
“We have now completely no visibility into that. All we’ve is the credentials that we noticed dumped that had been popping out of the tooling that they had been utilizing,” Biasini mentioned. “They had been working this device on techniques that they compromised, and that device would collect credentials and dump it out to a distant server that was open.”
PaidMemes’ instruments of the commerce
The instruments that the attacker makes use of, we’re advised, are principally wrappers round publicly out there community scanners, malware to disable antivirus or endpoint detection and response software program, Mimikatz to dump Home windows person credentials from reminiscence, and different freely out there code.
One in all these instruments, “Checker,” bundles a number of others corresponding to Distant Desktop Plus, PSEXEC, and Mimikatz, together with a GUI for credential administration to assist with lateral motion.
There’s one other wrapper known as Mimik that mixes Mimikatz and rclone to steal credentials and add them to an attacker-controlled server.
“That is one thing that you’d usually see out of sysadmins,” Biasini mentioned. “In the event that they’re doing actions, they’re bringing scripts, they’re bringing these packed-together, stitched-together issues that permit them to do their job extra rapidly and successfully.”
So, like sysadmins, however “with a malicious slant: to realize entry, or the info that they are making an attempt to get out of those networks.”
The felony additionally tends to make use of compromised computer systems’ Music, Photos or Paperwork folders to retailer the assault instruments.
In one of many BabyLockerKZ assaults, the Checker device had a PDB path with the string “paid_memes,” and that string allowed Talos to determine different recordsdata on VirusTotal, which had been primarily the ransomware samples.
New MedusaLocker variant
The principle payload, after all, is the data-encrypting malware, which Talos believes has been round since 2023. Cynet researchers final yr dubbed this MedusaLocker variant “Hazard,” and point out a BabyLockerKZ registry key of their evaluation.
Extra lately, Whitehat revealed PAIDMEMES PUBLIC and PRIVATE registry keys on a MedusaLocker pattern in Could.
Notice, MedusaLocker just isn’t the identical malware household as Medusa ransomware.
In relation to defending in opposition to ransomware crews, the problem is very “daunting” to small and medium-sized companies, Biasini mentioned. “MFA and SSO are the form of issues that assist deter any such entry, however the associated fee related to deploying any such expertise is awfully excessive.”
Plus, it is unlikely that these organizations have cyber insurance coverage that can pay the extortion calls for.
“I’d guess that small and medium companies are going to make an even bigger and larger chunk of ransomware exercise going ahead,” he opined. “The bigger organizations are getting higher at detecting ransomware, they’re getting higher at defending themselves, these small and medium companies are being left behind, and the ransomware actors nonetheless desire a payday.” ®