Original Article Text

Click to Toggle View

EncryptHub breaches 618 orgs to deploy infostealers, ransomware. A threat actor tracked as 'EncryptHub,' aka Larva-208,  has been targeting organizations worldwide with spear-phishing and social engineering attacks to gain access to corporate networks. According to a report by Prodaft, which was published internally last week and made public yesterday, since June 2024, when EncryptHub initiated operations, it has compromised at least 618 organizations. After gaining access, the threat actors install Remote Monitoring and Management (RMM) software, followed by the deployment of information stealers like Stealc and Rhadamanthys. In many observed cases, EncryptHub also deploys ransomware on compromised systems. Prodaft told BleepingComputer that the threat group is affiliated with RansomHub and BlackSuit, having deployed both ransomware encryptors in the past and possibly acting as an initial access broker for them or a direct affiliate. However, in many attacks the researchers observed, the threat actors deployed a custom PowerShell data encryptor, so they maintain their own variant too. Gaining initial access Larva-208's attacks involve SMS phishing, voice phishing, and fake login pages that mimic corporate VPN products like Cisco AnyConnect, Palo Alto GlobalProtect, Fortinet, and Microsoft 365. The attackers typically impersonate IT support in their messages to the targets, claiming an issue with VPN access or a security concern with their account, directing them to log in on a phishing site. Victims receive links that redirect them to phishing login pages where their credentials and multi-factor authentication (MFA) tokens (session cookies) are captured in real-time. Once the phishing process is over, the victim is redirected to the service's real domain to avoid raising suspicion. EncryptHub has bought over 70 domains that mimic the said products, such as 'linkwebcisco.com' and 'weblinkteams.com,' to increase the perceived legitimacy of the phishing pages. The phishing sites are hosted on bulletproof hosting providers like Yalishanda, which ProDaft says does not typically respond to justified takedown requests. Prodaft has also discovered there's another subgroup tracked as Larva-148, which helps purchase the domains used in the phishing campaigns, manage hosting, and set up the infrastructure. It's possible that Larva-148 sells domains and phishing kits to EncryptHub, though their exact relationship hasn't been deciphered yet. Deploying malware Once EncryptHub breaches a targeted system, it deploys various PowerShell scripts and malware to gain persistence, remote access, steal data, and encrypt files. First, they trick victims into installing RMM software like AnyDesk, TeamViewer, ScreenConnect, Atera, and Splashtop. This allows them to control the compromised system remotely, maintain long-term access, and make lateral movement possible. Next, they use different PowerShell scripts to deploy infostealers, such as Stealc, Rhadamanthys, and Fickle Stealer, to steal data stored in web browsers. This data includes saved credentials, session cookies, and cryptocurrency wallet passphrases. BleepingComputer has also seen Python scripts that perform similar behavior for Linux and Mac devices. In samples of the scripts seen by BleepingComputer, the threat actor attempts to steal a large amount of data from breached systems, including: Larva-208's final threat is ransomware in the form of a custom PowerShell-based encryptor that encrypts files using AES and appends the ".crypted" extension, deleting original files. A ransom note is generated for the victims, demanding a ransom payment in USDT via Telegram. Prodaft says EncryptHub is a sophisticated threat actor that tailors its attacks for better effectiveness, achieving high-value breaches on large organizations. "The LARVA-208 spear-phishing actor examined in this report exemplifies the increasing sophistication of targeted cyber attacks," warns Prodaft. "By employing highly customized social engineering tactics, advanced obfuscation methods, and meticulously crafted lures, this threat actor has demonstrated a significant capability to evade detection and compromise high-value targets."

Daily Brief Summary

CYBERCRIME // Global EncryptHub Phishing Spree Compromises Over 600 Firms

EncryptHub, identified as Larva-208, has compromised at least 618 organizations worldwide through spear-phishing and social engineering since June 2024.

The group gains entry via customized phishing attacks that mimic corporate VPN interfaces such as Cisco AnyConnect and Microsoft 365, capturing user credentials and MFA tokens.

After accessing a network, EncryptHub installs RMM software to maintain control, deploying infostealers and ransomware on the infected systems.

Information stealers used include Stealc and Rhadamanthys, which extract data such as browser-stored credentials and cryptocurrency wallet passphrases.

In several incidents, EncryptHub has deployed a custom PowerShell-based ransomware, encrypting files and demanding ransom in USDT via Telegram.

The group is linked to other cybercrime entities like RansomHub and BlackSuit, indicating potential affiliations or partnerships in the cybercrime ecosystem.

EncryptHub operates using infrastructure supported by bulletproof hosting providers, which complicates efforts to take down their phishing sites and command and control servers.