Linux-Version der neuen Cicada-Ransomware zielt auf VMware ESXi-Server

Teilen:

A new ransomware-as-a-service (RaaS) operation is impersonating the legitimate Cicada 3301 organization and has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide.

The new cybercrime operation is named after and uses the same logo as the mysterious 2012-2014 online/real-world game named Cicada 3301 that involved elaborate cryptographic puzzles.

However, there’s no connection between the two, and the legitimate project has issued a statement to renounce any association with the threat actors and condemned the ransomware operation’s actions.

“We do not know the identity of the criminals behind these heinous crimes, and are not associated with these groups in any way,” reads the statement from the Cicada 3301 organization.

Launched in early June

The Cicada3301 RaaS first began promoting the operation and recruiting affiliates on June 29, 2024, in a forum post to the ransomware and cybercrime forum known as RAMP.

However, BleepingComputer is aware of Cicada attacks as early as June 6, indicating that the gang was operating independently before attempting to recruit affiliates.

Like other ransomware operations, Cicada3301 conducts double-extortion tactics where they breach corporate networks, steal data, and then encrypt devices. The encryption key and threats to leak stolen data are then used as leverage to scare victims into paying a ransom.

The threat actors operate a data leak site that is used as part of their double-extortion scheme.

An analysis of the new malware by Truesec revealed significant overlaps between Cicada3301 and ALPHV/BlackCat, indicating a possible rebrand or a fork created by former ALPHV’s core team members.

This is based on the fact that:

  • Both are written in Rust.
  • Both Use the ChaCha20 algorithm for encryption.
  • Both employ identical VM shutdown and snapshot-wiping commands.
  • Both use the same user interface command parameters, the same file naming convention, and the same ransom note decryption method.
  • Both use intermittent encryption on larger files.

For context, ALPHV performed an exit scam in early March 2024 involving fake claims about an FBI takedown operation after they stole a massive $22 million payment from Change Healthcare from one of their affiliates.

Truesec has also found indications that the Cicada3301 ransomware operation may partner with or utilize the Brutus botnet for initial access to corporate networks. That botnet was previously associated with global-scale VPN brute-forcing activities targeting Cisco, Fortinet, Palo Alto, and SonicWall appliances.

It’s worth noting that the Brutus activity was first spotted two weeks after ALPHV shut down operations, so the link between the two groups still stands in terms of timelines.

Yet another threat to VMware ESXi

Cicada3301 is a Rust-based ransomware operation with both Windows and Linux/VMware ESXi encryptors. As part of Truesec’s report, the researchers analyzed the VMWare ESXi Linux encryptor for the ransomware operation.

Like BlackCat and other ransomware families, such as RansomHub, a special key must be entered as a command line argument to launch the encryptor. This key is used to decrypt an encrypted JSON blob that contains the configuration that the encryptor will use when encrypting a device.

Truesec says that the encryptor checks for the validity of the key by using it to decrypt the ransom note and, if successful, continues with the rest of the encryption operation.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:04 am, Jan. 24, 2025
Wetter-Symbol 10°C
L: 9° | H: 11°
overcast clouds
Luftfeuchtigkeit: 85 %
Druck: 994 mb
Wind: 17 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:49 am
Sonnenuntergang: 4:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
9° | 11°°C 0.8 mm 80% 16 mph 77 % 1001 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 6°°C 1 mm 100% 9 mph 94 % 1009 mb 2.83 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
3° | 8°°C 1 mm 100% 18 mph 97 % 1008 mb 0 mm/h
Mo. Jan. 27 9:00 pm
Wetter-Symbol
4° | 6°°C 1 mm 100% 17 mph 90 % 987 mb 0 mm/h
Di. Jan. 28 9:00 pm
Wetter-Symbol
5° | 7°°C 1 mm 100% 13 mph 96 % 999 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
9° | 10°°C 0.8 mm 80% 16 mph 77 % 994 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
8° | 9°°C 0 mm 0% 13 mph 65 % 997 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 8 mph 60 % 1001 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 6 mph 68 % 1001 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 5 mph 85 % 1000 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 93 % 998 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
5° | 5°°C 0.52 mm 52% 3 mph 94 % 998 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
3° | 3°°C 1 mm 100% 9 mph 84 % 1003 mb 2.83 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,962.03
3.47%
Ethereum(ETH)
€3,261.14
6.27%
XRP(XRP)
€3.05
2.71%
Fesseln(USDT)
€0.96
0.06%
Solana(SOL)
€253.11
6.64%
Dogecoin(DOGE)
€0.344040
2.52%
USDC(USDC)
€0.96
0.00%
Shiba Inu(SHIB)
€0.000019
1.46%
Pepe(PEPE)
€0.000014
4.62%
Peanut das Eichhörnchen(PNUT)
€0.333452
-4.27%
Nach oben scrollen