Article Details
Scrape Timestamp (UTC): 2024-02-16 16:12:30.913
Original Article Text
Click to Toggle View
Alpha ransomware linked to NetWalker operation dismantled in 2021. Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation. Netwalker was a prolific ransomware-as-a-service (RaaS) active between October 2019 and January 2021, when law enforcement seized its dark web sites, resulting in its operators going silent. The Alpha ransomware operation (not to be confused with ALPHV/BlackCat) emerged in February 2023 but kept a low profile, didn't promote on hacker forums, nor did its operators carry out many attacks. This changed recently when the group launched a data leak site to list victims and publish files stolen from breached networks. At the time of writing, Alpha shows nine victims on its extortion portal, and for eight of them the threat actor has already published the stolen files. A Neterich report from January 29 says that Alpha has gradually grown more sophisticated. In the most recent version, the ransomware appends a random 8-character alphanumeric extension to encrypted files. Also, after many ransom note iterations, the latest includes instructions for victims to contact the threat actor over a messaging service. The reported ransom demand, according to Neterich, ranges between 0.272 BTC ($13,200 by today's exchange rate) and up to $100,000, likely depending on the business size of the victim. Links to Netwalker A new report published today by Symantec's threat analysts links Alpha to the defunct Netwalker ransomware, based on tools and tactics, techniques, and procedures used in attacks. The key similarities the Symantec highlights include the following: Symantec also reports that recent Alpha attacks extensively employ living-off-the-land tools, including Taskkill, PsExec, Net.exe, and Reg.exe, for evasion. However, this is common to many ransomware gangs. The above similarities indicate a strong link between NetWalker and Alpha's developers, which could either mean a revival of NetWalker under the Alpha brand or that its code is being reused by a new threat group. Symantec notes that a new attacker could have acquired the NetWalker payload and adapted it for their ransomware operation. Although it is not currently a significant player on the ransomware scene, Alpha is regarded as an emerging threat organizations should watch out for.
Daily Brief Summary
Alpha ransomware, reminiscent of NetWalker, exhibits similar patterns and tools indicating a possible connection.
NetWalker, a former ransomware-as-a-service operation, was taken down by law enforcement in January 2021.
The newly emerged Alpha ransomware has been lowkey until it launched a data leak site showcasing its victims.
Neterich's analysis reveals Alpha's growing sophistication and increased ransom demands ranging from 0.272 BTC to $100,000.
Symantec's report identifies overlaps in the modus operandi of Alpha and NetWalker attacks, suggesting a potential revival or reuse of NetWalker code.
Common living-off-the-land tools used by Alpha for evasion mirror techniques used by several ransomware groups.
Despite not being a significant player currently, the cybersecurity community is advised to monitor the activities of the Alpha ransomware group.