

FormBook Malware – Active IOCs
October 18, 2024
Microsoft Discovers Flaw in macOS Allowing to Circumvent Safari’s Privacy Controls
October 18, 2024
FormBook Malware – Active IOCs
October 18, 2024
Microsoft Discovers Flaw in macOS Allowing to Circumvent Safari’s Privacy Controls
October 18, 2024Severity
High
Analysis Summary
Cicada3301 is a newly emerging ransomware-as-a-service (RaaS) group that came to the cybersecurity community’s attention in June 2024 with strong similarities to the now-defunct BlackCat ransomware. The group has already compromised at least 30 organizations in the U.S. and U.K. across critical sectors.
The ransomware written in Rust is cross-platform, targeting a wide range of systems, including Windows, Linux (Ubuntu, Debian, Fedora, and others), ESXi, NAS, and PowerPC architectures. It is capable of partial or full file encryption, shutting down virtual machines, halting recovery processes, and encrypting network shares to maximize impact.
Researchers accessed Cicada3301's affiliate panel on the dark web after contacting the group via a cybercrime forum. This panel offers extensive features for affiliates, including sections such as a dashboard for tracking attacks, news about product updates, options to add victims and create ransomware builds and communication interfaces to negotiate with victims or seek support from the Cicada3301 group. The affiliate program targets penetration testers and access brokers, offering a 20% commission for their involvement.

The RaaS program also allows affiliates to easily configure ransomware for various operating systems and manage ransom negotiations. Cicada3301 leverages ChaCha20 and RSA encryption for securing files, and before encryption, affiliates exfiltrate data to increase pressure on victims. The ransomware can terminate processes, delete shadow copies, and inhibit system recovery making it a highly dangerous tool for disrupting organizations.
Cicada3301's sophisticated approach, offering both advanced tooling and a user-friendly interface for affiliates makes it a rising threat in the ransomware landscape. By recruiting skilled cybercriminals and providing customizable tools, the group ensures that affiliates can carry out highly targeted and damaging attacks. The ability to halt virtual machines and encrypt network shares highlights their focus on maximizing operational disruption for their victims.
Impact
- File Encryption
- Financial Loss
- Sensitive Data Theft
Indicators of Compromise
MD5
- 24a648a48741b1ac809e47b9543c6f12
- a77d3a4446ae106ccc6c251611231cbc
- 93c9f52f61b6a4ebe70f1167e1d7573b
- 59d756280b06cf113ca43abc0050edd5
SHA-256
- 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
- 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
- 3969e1a88a063155a6f61b0ca1ac33114c1a39151f3c7dd019084abd30553eab
- 56e1d092c07322d9dad7d85d773953573cc3294b9e428b3bbbaf935ca4d2f7e7
SHA-1
- 3e2272b916da4be3c120d17490423230ab62c174
- 54a8fe5c70ed0007fdd346a9a75977fd9f8ad24a
- 6c08a863c2e5288d4ce2a9d46a725518f12711a7
- a9da26cba0230c60880b1bec3f391ab43095de01
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Ensure all operating systems, software, and firmware, including VMware ESXi, are up-to-date with the latest patches to protect against known vulnerabilities that Cicada3301 and similar ransomware might exploit.
- Regularly update firmware and monitor for any unauthorized access attempts.
- Segment your network to limit the spread of ransomware. Ensure critical systems are isolated and employ strict access controls to minimize lateral movement if an attacker breaches the network.
- Regularly back up critical data and ensure that backups are stored securely and are not accessible from the primary network to prevent them from being encrypted or deleted by ransomware. Test backup restoration procedures periodically to ensure data integrity and availability.
- Ransomware often uses built-in tools like PowerShell, esxcli, and vim-cmd for malicious activities. Restrict and monitor the use of these tools for legitimate administrative purposes only, and use logging to detect unusual activity.
- Utilize EDR solutions to detect and respond to malicious activities quickly. Focus on identifying behaviors associated with ransomware attacks, such as the unusual creation of files, modifications to system processes, and encryption-related commands.
- Since Cicada3301 targets VMware ESXi environments, configure these environments with security best practices, such as disabling unnecessary services, limiting access to management interfaces, and employing strong authentication methods.
- Conduct regular training sessions to educate employees on identifying phishing emails and other social engineering tactics that could be used to deliver ransomware. Encourage reporting of suspicious emails and activities.
- Develop and routinely test an incident response plan specifically tailored for ransomware incidents. This plan should include procedures for isolating affected systems, communicating with stakeholders, and safely restoring operations.
- Regularly perform security audits and penetration testing to identify and remediate vulnerabilities in your network that could be exploited by ransomware attackers.