Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

3AM Ransomware – Threat Actor

February 11, 2025
Reading Time: 4 mins read
in Ransomware Group, Threat Actors
3AM Ransomware – Threat Actor

3AM Ransomware

Date of Initial Activity

2023

Location

Unknown

Suspected Attribution 

Ransomware Group

Motivation

Financial Gain

Software

Servers
Database

Overview

The 3AM ransomware group is a newly emerged cybercriminal threat that has gained attention for its sophisticated tactics and adaptability. First observed by Symantec’s Threat Hunter Team, the group made its debut when an affiliate attempted to deploy the well-known LockBit ransomware but was thwarted by detection systems. In response, the attackers switched tactics and resorted to using 3AM, a completely new and unknown ransomware strain. This flexibility in adapting to security measures exemplifies a growing trend among ransomware actors, where attackers are quick to alter their approach based on real-time feedback from their targets’ defenses. The 3AM ransomware is still in the early stages of its deployment, with its use thus far being limited, but its technical sophistication indicates that it may soon become a more prominent player in the ransomware landscape. What makes the 3AM ransomware particularly notable is its origins and development in Rust, a programming language known for its efficiency, memory safety, and obfuscation capabilities. By utilizing Rust, the group can create a more resilient and stealthy ransomware variant, capable of evading detection by traditional security solutions. Additionally, 3AM employs highly targeted methods to disable key services and backup systems on infected machines, making it more difficult for victims to recover their data. This strategy is not new for ransomware families, but 3AM seems to have fine-tuned these techniques, further complicating recovery efforts.

Common targets

Health Care and Social Assistance

Information

United States

Attack Vectors

Phishing

Software Vulnerabilities

How they operate

At the outset of an attack, 3AM leverages common penetration tools to escalate privileges and perform reconnaissance on the target network. One of the first signs of the attackers’ presence is the execution of the gpresult command to dump group policy settings, allowing them to understand the security policies in place on the targeted system. Following this, the attackers use tools like Cobalt Strike and PsExec to execute arbitrary commands and gain higher levels of access. The PsExec tool, for instance, allows the attackers to execute remote commands on other systems, aiding in lateral movement across the network. Additionally, reconnaissance commands such as whoami, netstat, and net share are run to enumerate the network, identifying shared resources and other systems that could be exploited. Once sufficient access has been gained, the attackers begin preparing the environment for the ransomware deployment. They typically add a new user to the system for persistence and use the Wput tool to exfiltrate files to their own server. This phase of the attack often involves scanning the network for backup systems or sensitive files that can be targeted for encryption. However, the most notable characteristic of 3AM is its adaptability. Initially, the attackers attempted to deploy the more well-known LockBit ransomware, but when that attempt was thwarted, they quickly switched to deploying 3AM instead. This ability to adapt to defense mechanisms on the fly is a key feature of the group’s operational methodology. The execution of the 3AM ransomware itself is highly methodical. The malware utilizes several command-line parameters to control its behavior, such as -k, which accepts a 32-character base64-encoded access key, and -m, which determines whether the attack will be executed locally or across the network. The ransomware also uses -s to control the speed of encryption by adjusting offsets within the files. Once the malware is executed, it begins by disabling crucial services, including security and backup services, to ensure that recovery efforts are thwarted. Commands such as wbadmin.exe are used to delete backup copies, while services like Veeam and Acronis are forcibly stopped to disable data restoration methods. Following the disabling of key services, 3AM proceeds with the encryption of files. The ransomware scans for files that meet certain predefined criteria, and once identified, the files are encrypted with the .threeamtime extension. The original files are then deleted to prevent recovery. A ransom note, named “RECOVER-FILES.txt,” is created in each affected directory, detailing the ransom demand and the group’s threat to sell sensitive data on the Dark Web if the ransom is not paid. The note also references the mystique of “3 AM,” using psychological pressure to prompt victims into immediate action. The attackers warn against attempts to restore data independently, suggesting that doing so could lead to permanent data loss. What makes the 3AM ransomware particularly dangerous is its targeted nature and the use of multiple layers of encryption, as well as its persistence on compromised networks. The group’s strategic approach ensures that not only are files encrypted, but recovery is made difficult through the destruction of backups and the prevention of self-restoration. Furthermore, the ransom demand is tied to sensitive data exfiltration, with the group threatening to leak stolen information on the Dark Web. This combination of file encryption and data theft makes 3AM a formidable threat to both individuals and organizations. In conclusion, the 3AM ransomware group operates with a highly technical and adaptive approach, using advanced tools and strategies to infiltrate, exploit, and encrypt targeted networks. By leveraging common penetration tools for network reconnaissance and privilege escalation, followed by a highly controlled deployment of their ransomware, the group is able to bypass many traditional defenses. The technical sophistication of 3AM underscores the growing complexity of ransomware attacks and highlights the importance of comprehensive cybersecurity measures, including robust backup systems, network segmentation, and proactive threat detection capabilities. As the group continues to refine its methods, it is likely that 3AM will become an increasingly significant player in the global ransomware landscape.  
References:
  • 3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack
Tags: 3AM ransomwareCobalt StrikeHealth CareLockBitPsExecRansomwareSymantecThreat ActorsUnited StatesVulnerabilities
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial