

Heodo Malware – Active IOCs
August 14, 2024
Bitter APT – Active IOCs
August 14, 2024
Heodo Malware – Active IOCs
August 14, 2024
Bitter APT – Active IOCs
August 14, 2024Severity
High
Analysis Summary
The FBI has successfully dismantled key infrastructure belonging to the nascent ransomware group Dispossessor, also known as Radar. This action involved taking down 31 servers across the U.S., U.K., and Germany, as well as nine criminal domains.
Dispossessor emerged in August 2023 and has quickly gained notoriety for targeting small-to-mid-sized businesses across various sectors, including education, healthcare, and financial services. The group employs a ransomware-as-a-service (RaaS) model, similar to LockBit, which involves data exfiltration and encryption, pressuring victims into paying ransom by threatening data exposure.
The FBI said, "Once the company was attacked, if they did not contact the criminal actor, the group would then proactively contact others in the victim company, either through email or phone call."
Previous reporting from cybersecurity researchers found that Dispossessor's attack strategy includes exploiting systems with weak security measures such as flaws or poor password practices to gain unauthorized access and escalate privileges. Notably, if a targeted company does not respond to initial ransom demands, the group proactively contacts other individuals within the organization using emails and phone calls to increase pressure. These communications often include links to platforms where stolen data is showcased, intensifying the extortion efforts. The group has also been linked to reposting data from other ransomware operations including Cl0p and 8Base.

The broader ransomware landscape in 2024 highlights the increasing sophistication and adaptability of such groups. Data indicates that the manufacturing, healthcare, and construction industries were the most impacted by ransomware in the first half of the year. The U.S., Canada, and several European countries remain top targets. A key driver of ransomware activity has been the exploitation of newly disclosed vulnerabilities which threat actors quickly leverage to breach networks and escalate their attacks.
A growing trend is the emergence of new ransomware groups and the professionalization of RaaS business models. These groups are increasingly resembling legitimate businesses, complete with marketplaces, product offerings, and 24/7 support. This shift is facilitating large-scale attacks, particularly on smaller organizations with less mature security measures, and is fostering an ecosystem of collaboration among cybercriminals, enabling them to scale operations and increase the effectiveness of their attacks.
Impact
- Unauthorized Access
- Financial Loss
- Sensitive Data Theft
Remediation
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.