Article Details

Scrape Timestamp (UTC): 2024-10-17 13:56:40.162

Source: https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html

Original Article Text

Click to Toggle View

Cross-Platform Cicada3301 Ransomware Targets Windows, Linux, and NAS Devices. Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group's affiliate panel on the dark web. Singapore-headquartered Group-IB said it contacted the threat actor behind the Cicada3301 persona on the RAMP cybercrime forum via the Tox messaging service after the latter put out an advertisement, calling for new partners into its affiliate program. "Within the dashboard of the Affiliates' panel of Cicada3301 ransomware group contained sections such as Dashboard, News, Companies, Chat Companies, Chat Support, Account, an FAQ section, and Log Out," researchers Nikolay Kichatov and Sharmine Low said in a new analysis published today. Cicada3301 first came to light in June 2024, with the cybersecurity community uncovering strong source code similarities with the now-defunct BlackCat ransomware group. The RaaS scheme is estimated to have compromised no less than 30 organizations across critical sectors, most of which are located in the U.S. and the U.K. The Rust-based ransomware is cross-platform, allowing affiliates to target devices running Windows, Linux distributions Ubuntu, Debian, CentOS, Rocky Linux, Scientific Linux, SUSE, Fedora, ESXi, NAS, PowerPC, PowerPC64, and PowerPC64LE. Like other ransomware strains, attacks involving Cicada3301 have the ability to either fully or partially encrypt files, but not before shutting down virtual machines, inhibiting system recovery, terminating processes and services, and deleting shadow copies. It's also capable of encrypting network shares for maximum impact. "Cicada3301 runs an affiliate program recruiting penetration testers (pentesters) and access brokers, offering a 20% commission, and providing a web-based panel with extensive features for affiliates," the researchers noted. A summary of the different sections is as follows - "The Cicada3301 ransomware group has rapidly established itself as a significant threat in the ransomware landscape, due to its sophisticated operations and advanced tooling," the researchers said. "By leveraging ChaCha20 + RSA encryption and offering a customizable affiliate panel, Cicada3301 enables its affiliates to execute highly targeted attacks. Their approach of exfiltrating data before encryption adds an additional layer of pressure on victims, while the ability to halt virtual machines increases the impact of their attacks."

Daily Brief Summary

MALWARE // Cicada3301 Ransomware Threatens Multiple Systems Globally

Cicada3301 is a new ransomware-as-a-service (RaaS) platform impacting Windows, Linux, and NAS devices.

Originating in June 2024, it shares code similarities with BlackCat, a defunct ransomware operation.

Researchers from Group-IB accessed Cicada3301’s affiliate panel via the dark web, uncovering its significant threat and expansive reach.

The ransomware has already compromised over 30 organizations primarily in the U.S. and U.K., targeting critical sectors.

Cicada3301 utilizes a cross-platform Rust-based ransomware strain, capable of shutting down virtual machines, terminating processes, and encrypting files and network shares.

It includes an affiliate program that recruits penetration testers and access brokers, offering a 20% commission and featuring a sophisticated web panel to manage attacks.

Additional threats from Cicada3301 involve data exfiltration before encryption and the halting of virtual machines to maximize damage.

Leveraging ChaCha20 + RSA encryption, the group executes highly targeted and destructive attacks, raising substantial concerns for cybersecurity across multiple industries.