Ransomware is malicious software that encrypts the victim’s data and demands payment in return causing financial losses and operational disruptions. According to NCC Group's findings, the number of overall ransomware victims affiliated with different ransomware groups peaked in September 2023, with a total of 514 incidents. This surpasses the previous record set in July 2023, where there were 502 reported attacks.
The report also provided a graphical representation that illustrates an upward trajectory in the trend. While there was a minor decline in ransomware attacks during March-April and July-August, incidents have been on the rise throughout the other months of 2023. When compared to 2022, the data indicates a noteworthy surge in the frequency of ransomware attacks.
Fig: Global Ransomware Attacks by Month 2022 - 2023 (Source: NCC group)
The escalating trend in ransomware attacks underscores the severity of this growing threat. Ransomware, continues to become increasingly sophisticated with each passing day, emphasizing the need for individuals and organizations to remain vigilant. An illustrative example of a conversation between a victim and a ransomware group vividly portrays the merciless nature of these cyber criminals. This interaction reminds the urgency for robust cybersecurity measures and heightened awareness.
Fig: A chat between a victim and the ransomware group (source)
Among the many ransomware groups, Cactus is a newcomer yet it has quickly made a significant impact since its first emergence in March 2023. It has targeted many high-profile targets, with 58 victims as of November reported by Darkfeed. Cactus employs double extortion tactics, compromising sensitive data before encryption, leaving victims with limited choices. The most peculiar behavior of this ransomware is its evasion techniques including encrypting itself to avoid anti-malware detection and utilizing multiple batch scripts for various actions alongside acquiring the ransomware binary. The encrypted files have the .cts extension and the ransom note is named cAcTuS.readme.txt.
A comprehensive malware analysis by Swascan shows that Cactus ransomware has several unique features like auto-encryption and a consecutive change of file extensions post-encryption, making the identification of affected files more challenging. It utilizes the C:\ProgramData\ntuser.dat file to store the public key for encrypting the malware sample itself to create confusion and evade detection. According to Swascan, two key aspects of Cactus ransomware that stand out are:
It employs the well-known and easily "unpackable" UPX packer.
It divides encrypted files into micro-buffers, possibly to speed up the management of encrypted data streams.
Fig: Cactus Ransom Note (Source: SalvageData)
Fig: Encrypted Files (Source: pcrisk)
Cactus ransomware's impact is undeniably severe, causing a lot of damage. However, it's crucial to recognize that Cactus is not alone with such a devastating impact; numerous ransomware families can do the same. These threats can disrupt business operations, tarnish reputations, and result in substantial financial losses through ransom payments, diminished revenue, and regulatory fines. In extreme cases, the cumulative impact may even lead a company into bankruptcy.
However, these sorts of cybersecurity incidents can be prevented to some extent with good security practices. Proactive cybersecurity practices are essential, and established organizations such as NIST, CISA, and SANS provide valuable guidelines for good security practices.
In light of Cactus ransomware, patching the VPN flaw can be a major preventive measure. However, organizations can fortify their defenses with the following proactive steps:
The attached report contains an in-depth analysis of cactus ransomware along with proactive security, threat-hunting, and incident response guidelines necessary to fortify your organization against ransomware attacks. Access the complete report for a comprehensive overview and actionable insights on safeguarding your systems and data from such attacks.