March 28, 2023

Feb 10, 2023Ravie LakshmananMenace Intelligence / Ransomware

Healthcare Ransomware Attack

State-backed hackers from North Korea are conducting ransomware assaults towards healthcare and demanding infrastructure services to fund illicit actions, U.S. and South Korean cybersecurity and intelligence companies warned in a joint advisory.

The assaults, which demand cryptocurrency ransoms in change for recovering entry to encrypted recordsdata, are designed to help North Korea’s national-level priorities and goals.

This consists of “cyber operations focusing on the USA and South Korea governments — particular targets embody Division of Protection Info Networks and Protection Industrial Base member networks,” the authorities said.

Menace actors with North Korea have been linked to espionage, monetary theft, and cryptojacking operations for years, together with the notorious WannaCry ransomware assaults of 2017 that contaminated lots of of 1000’s of machines situated in over 150 nations.

Since then, North Korean nation-state crews have dabbled in a number of ransomware strains akin to VHD, Maui, and H0lyGh0st to generate a gentle stream of unlawful revenues for the sanctions-hit regime.

Apart from procuring its infrastructure by means of cryptocurrency obtained by way of its legal actions, the adversary is understood to create pretend personas, operate underneath third-party international affiliate identities, make use of intermediaries, and make the most of VPNs to hide its origins.

Assault chains mounted by the hacking crew entail the exploitation of recognized safety flaws in Apache Log4j, SonicWall, and TerraMaster NAS home equipment (e.g., CVE 2021-44228, CVE-2021-20038, and CVE-2022-24990) to achieve preliminary entry, following it up by reconnaissance, lateral motion, and ransomware deployment.

Along with utilizing privately developed ransomware, the actors have been noticed leveraging off-the-shelf instruments like BitLocker, DeadBolt, ech0raix, Jigsaw, and YourRansom for encrypting recordsdata, to not point out even impersonating different ransomware teams akin to REvil.

The inclusion of DeadBolt and ech0raix is notable because it marks the primary time authorities companies have formally tied the ransomware strains, that are notable for repeatedly focusing on QNAP NAS units, to a selected adversarial group.

Alternatively, malware is distributed by way of trojanized recordsdata of a messenger app known as X-Popup in assaults focusing on small and medium-size hospitals in South Korea.

As mitigations, the companies suggest organizations to implement the precept of least privilege, disable pointless community machine administration interfaces, implement multi-layer community segmentation, require phishing-resistant authentication controls, and keep periodic information backups.

The alert comes as a brand new report from the United Nations discovered that North Korean hackers stole record-breaking digital belongings estimated to be value between $630 million and greater than $1 billion in 2022.

The report, seen by the Associated Press, mentioned the menace actors used more and more subtle strategies to achieve entry to digital networks concerned in cyberfinance, and to steal info from governments, firms, and people that could possibly be helpful in North Korea’s nuclear and ballistic missile packages.

It additional known as out Kimsuky, Lazarus Group, and Andariel, that are all a part of the Reconnaissance Basic Bureau (RGB), for persevering with to focus on victims with the purpose of making income and soliciting information of worth to the hermit kingdom.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.