Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

RansomHub (Ransomware Group) – Threat Actor

August 6, 2024
Reading Time: 9 mins read
in Ransomware Group, Threat Actors
RansomHub (Ransomware Group) – Threat Actor

RansomHub

Other Names

No

Country of Origin

Various Locations Globally

Date of initial activity

2024

Government Affiliation

Unknown

Associated Groups

RansomHub comprises hackers from various global locations

Motivation

Financial Gain

Overview

RansomHub has swiftly made its mark in the ransomware landscape by substantiating its claims with data leaks, starting with its first victim, Brazilian company YKP, in February 2024. Since then, they have claimed 18 victims, although their current leak site lists 14. The group, comprised of hackers from various global locations, operates under a structured framework akin to traditional Russian ransomware groups but explicitly avoids targeting countries like CIS, Cuba, North Korea, and China. Functioning as a Ransomware-as-a-Service (RaaS) entity, RansomHub collaborates closely with affiliates, offering them a significant 90% share of ransom proceeds upfront—a departure from typical RaaS practices aimed at rebuilding trust post-ALPHV’s notorious exit scam. They recruit affiliates primarily from forums like RAMP and utilize ransomware strains rewritten in Golang for their operations. Victims listed on RansomHub’s leak site span various countries, including the US, Brazil, Indonesia, and Vietnam. Notably, while major corporations have not yet surfaced among their targets, critical sectors such as healthcare have been impacted, highlighting their widespread influence. Recent engagements by RansomHub have also showcased their adaptability, with instances of exploiting the ZeroLogon vulnerability (CVE-2020-1472) to compromise domain controllers and facilitate extensive network access and data encryption capabilities.

Common targets

The gang’s website states that they refrain from targeting CIS, Cuba, North Korea, and China and non-profit organizations. Threat actors are listing victims from various countries without following a specific pattern, targeting a diverse range of nations such as the US, Brazil, Indonesia, and Vietnam. While notably large companies have not appeared on the list so far, healthcare-related institutions, which are considered critical sectors, are among the listed victims.

Attack Vectors

Ransomware. Recent attacks have leveraged the old but critical ZeroLogon vulnerability: CVE-2020-1472 (CVSS: 10).

How they operate

RansomHub, a newly emerged player in the ransomware landscape since early 2024, operates distinctly within the realm of cybercrime by blending traditional tactics with modern strategies. The group, comprised of hackers from various global locations, operates under a structured framework reminiscent of Russian cybercrime organizations. They explicitly avoid targeting specific countries like CIS, Cuba, North Korea, and China, which aligns with typical operational preferences observed among Russian-affiliated cybercriminal groups. Functioning as a Ransomware-as-a-Service (RaaS) entity, RansomHub recruits affiliates primarily through forums such as RAMP, where they offer a generous 90% share of ransom payments upfront to build trust and attract capable partners. This approach contrasts sharply with past incidents, such as the ALPHV scam, which eroded trust in RaaS models due to non-payment issues. By offering such favorable terms, RansomHub positions itself uniquely in the cybercrime ecosystem, appealing to skilled affiliates seeking reliable financial gain. Technically, RansomHub leverages ransomware strains written in Golang, a programming language valued for its efficiency and cross-platform capabilities. This adaptation allows their malware to operate stealthily across diverse systems, complicating detection and mitigation efforts by cybersecurity teams. The group demonstrates a keen understanding of vulnerabilities and exploits, as evidenced by their use of the ZeroLogon vulnerability (CVE-2020-1472) to compromise domain controllers. This tactic provides them with extensive network access, facilitating the deployment of ransomware payloads across compromised environments. Operationally, RansomHub employs a range of tools and tactics to execute their attacks effectively. They utilize remote access tools like Atera and Splashtop for initial network compromise and reconnaissance, enhancing their ability to identify and exploit vulnerabilities within targeted networks. Tools such as NetScan aid in network reconnaissance, allowing them to map out target environments and identify critical assets for encryption or exfiltration. Victimology-wise, RansomHub’s targets span various sectors and geographies, with notable incidents affecting healthcare institutions and companies in the US, Brazil, Indonesia, and Vietnam. While major corporations have not yet surfaced among their victims, their focus on critical sectors underscores their disruptive potential and the broader impact of ransomware on global cybersecurity.

Mitigation

Defense and Mitigation Strategies:
  • Implement robust backup strategies.
  • Maintain stringent patch management protocols.
  • Deploy advanced endpoint protection solutions.
  • Conduct regular security audits and penetration testing.
  • Adopt network segmentation strategies.
  • Enhance user access controls.
  • Develop and test incident response plans.
  • Educate and train employees on cybersecurity.
  • Enhance email and web security.
  • Regularly verify and test backup data.
References:
  • RansomHub: New Ransomware has Origins in Older Knight
  • Dark Web Profile: RansomHub
  • RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates
  • New RansomHub ransomware gang has ties to older Knight group
  • RansomHub. Because every abandoned affiliate needs a home.
  • The rise of RansomHub: Uncovering a new ransomware-as-a-service operation
Tags: BrazilChinaCISCubaCybercrimeGolangHealthcareIndonesiaNorth KoreaRansomHubRansomwareRansomware GroupRussiaThreat ActorsUSAVietnamVulnerabilityYKPZeroLogon
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial