RansomHub exploits RDP for massive data exfiltration

August 30, 2024
1 min read

TLDR:

Key Points:

  • RansomHub exploiting RDP services to exfiltrate large volumes of data
  • Operates as a Ransomware-as-a-Service (RaaS) group targeting organizations in healthcare, finance, and government sectors

RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data

RansomHub, a Ransomware-as-a-Service (RaaS) group, has been using RDP services to steal data from victims. Operating in double extortion manner, they encrypt files and steal information primarily from organizations in the US, UK, Spain, France, and Italy, specializing in healthcare, finance, and government sectors. The group demands high ransom payments, estimated at $50 million for attacks in northern Africa.

The ransomware used by RansomHub, based on Golang, is capable of running on Windows, Linux, and ESXi IDE, with features like network propagation, Safe Mode, and hardware-accelerated encryption. The attack chain involves compromised Admin accounts, LummaC2 stealer, and tools like Netscan, smbexec, and PsExec for lateral movement and data exfiltration via rclone to Mega.

To prevent such threats, organizations are advised to enhance access controls, improve monitoring, respond efficiently to security incidents, enforce OTP-based MFA for remote access, maintain strong backup policies, and conduct regular ransomware readiness assessments.

Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and