A new ransomware-as-a-service (RaaS) gang, called ‘Read The Manual’ (RTM Locker), has been identified by cybersecurity firm Trellix. The group offers its malicious code to affiliates via strict rules and aims to remain under the radar, avoiding targeting critical infrastructure, law enforcement, hospitals, COVID-19 vaccine-related organizations, and other high-profile companies.
The affiliates are obliged to remain active, and the group threatens to ban anyone who leaks samples of the malware. Communication with the gang is only allowed via the TOX messenger.
Trellix experts explained that the RTM Locker is not designed for automated campaigns as it only properly works once it gains the required administrative privileges. Attackers can leverage phishing attacks, malspam campaigns, exploits for vulnerabilities in publicly exposed systems, or bought access to target networks to access brokers.
Based on the group’s modus operandi, the experts believe that the group is opportunity-based rather than targeting a single industry or specific corporations. The gang’s primary objective seems to be making money, rather than a political motive.
The researchers found that the group has a business-like set-up where affiliates are required to remain active or notify the gang of their leave, showing the organizational maturity of the group.
The gang also avoids targeting the Commonwealth of Independent States in Eastern Europe and Asia (CIS) region, where the notifications are posted in Russian and English. The group prohibits the redistribution of the RTM Locker malware builds to prevent them from being analyzed, and the samples contain a self-delete mechanism, which is invoked once the victim’s device is encrypted.
In an update provided by the gang, it admitted to an internal conflict due to the ongoing war in Ukraine, which led to data leakage. The group is working to transfer and restore data, and new software will be bled by experienced negotiators for some time.