Other ransomware ads obtained included those that offered “set-up assistance” “for as low was $200,” and those with “no fees.” Adlumin also observed advertisements offering full builds from $300 to $1100 “ready for deployment.”
One of the ads described the malware being offered as using “many cutting-edge evasion techniques including proprietary methods.”
And in some ads, RaaS operators boasted having ransomware kits for targeting MacOS systems.
“We have developed a new MacOS ransomware as we noticed a lack of it,” the ad read.
At least one post, stated that the ransomware for sale was what “the cool kids are using,” alluding that someone doesn’t have to be “cool” – or perhaps, highly skilled – to purchase and use it.
Easy Enough for a Script Kiddie
Script kiddies are individuals who possess fundamental hacking skills and the knowledge to deploy and execute exploits written by experienced threat actors. They’re able to learn new skills easily and eventually, often become “real hackers” themselves.
Since 2015, researchers have written about the ability script kiddies have for deploying ransomware and often working side-by-side with well-known threat actor organizations.
In March 2022, police in the UK arrested members of the Lapsus$ cybercriminal group known for targeting tech companies such as Okta, Nvidia, Samsung, and Microsoft. The raid included the arrest of teenagers and young adults with ages ranging from 13 to 21, according to the BBC. It’s not clear, however, if the youngsters were script kiddies simply due to their age.
With enough documentation and technical support – and with generative AI tools now being able to assist them as well – a script kiddie can be more than capable of carrying out an attack. However, attacks by these less-skilled individuals often include a higher degree of basic mistakes that make them easier for an organization with capable cybersecurity operation to stop.
For example, Adlumin has observed ransomware attacks foiled by its security operations platform or its MDR team during an attack’s early stages. In some cases, threat actors don’t even get the chance to encrypt files. There are also incidents where SOAR actions within the Adlumin platform disable accounts created by threat actors, effectively locking them out from the network. Sometimes attacks are carried out, but no data is exfiltrated.
Money to be Made
Ransomware attacks are very lucrative, especially since 73% of companies attacked pay the ransom. And with double extortion becoming the norm, organizations that don’t pay are publicly shamed by RaaS operators on the clear or dark web.
For script kiddies of any age, ransomware may seem like a great way to make a living and become rich quickly. Also, with high unemployment rates in many countries in Latin America and other parts of the world, cybercrime may be seductive for underemployed or poorly paid computer programmers, or people in similar careers. According to DevelopmentAid.org, “[Poor countries] serve as training grounds for criminal groups in preparation for more ambitious attacks in developed countries.”
When RaaS operators advertise ransomware kits that come with everything a hacker will need, including documentation, forums, technical support, and ransom negotiation support, script kiddies will be tempted to try their luck and put their skills to use. And since there are probably more script kiddies than “real hackers” today, businesses and authorities should take note and prepare for a growing wave of incidents.
Breadcrumbs
IOCs, such as malicious IP addresses, domains, TOR addresses, emails, hashes, executables, and others discovered from an attack can be very useful to analysts, researchers, and law enforcement. They serve as clues to help put together what transpired during the incident and how. They can also offer some insight about the level of sophistication of the attackers.
When threat actors follow RaaS-provided playbooks, they will likely adhere to them closely on the first few attacks. They’ll make mistakes, and if those mistakes are big enough, they could serve as breadcrumbs for the authorities to follow.
Anything an attacker does in a network can help authorities if they are contacted after an incident. This is why investigators request that victims share any IOCs that could help with their investigations. Even if a business pays the ransom, details like Bitcoin or Monero addresses and transaction IDs, communication or chat logs with threat actors, the decryptor file, and a sample of an encrypted file can be very useful.
If a newbie or script kiddie isn’t meticulous with their work, the FBI could soon be knocking on their door.Conclusion
Ransomware attacks continue to be among the most prevalent cyber threats and increased by 37% in 2023. Companies should expect more ransomware attacks in the future, not less. And if more novice attackers are finding that ransomware attacks can be carried out easily with the help and support provided by RaaS operators, they’ll continue to frequent dark net forums to join the most inviting ransomware affiliate group.
At the same time, novice attackers are more likely to make mistakes since they are not as experienced, potentially leaving behind significant IOCs that the authorities can use to help track and apprehend them.
The Adlumin MDR Team will continue to monitor and stop ransomware attacks carried out by newbies and experts alike. Our security operations platform’s SOAR actions have been successful at foiling these attacks in their early stages, stopping cybercriminals on their tracks.
Furthermore, Adlumin now offers Total Ransomware Defense (TRD), a service specifically designed to detect ransomware activity and stop it. In the unfortunate case that files are encrypted, TRD is able to generate decryption keys to restore systems and networks.
Indicators of Compromise (IOCs)
Usernames
Objects
- exe
- zip.json.PLAY
- exe
- exe
- PLAY
- exe
- ini.PLAY
- aut
- omaticDestinations-
- PLAY
- exe
- json.PLAY
- cdp.PLAY
- HeartBea
- updatestore51b519d5-b6f5-4333-8df6-e74d7c9aead4.xml.PLAY
- exe
- cookie.PLAY
- js.PLAY
- exe
Paths
C:\\Users\\Public\\Music
\\Device\\HarddiskVolume3\\CollectGuestLogsTemp
Hash: null
C:\\Users\\Public\\Music
Hash:
b042bc03144919c0fed9d60c1f68eb04ed7
2c2f6
C:\\windows
Hash:
51d3d661774cc50bb22e62beafc4bc6029d
f2392
\\Device\\HarddiskVolume2\\Users\\it.ad
min\\AppData\\Local\\Google\\Chrome\\
User Data\\Default\\Cache\\Cache_Data
Hash: null
C:\\Windows
Hash:
51d3d661774cc50bb22e62beafc4bc6029d
f2392
\\Device\\Mup\\10.20.0.15\\C$\\$Recycl
e.Bin\\S-1-5-21-3568089881-786281157-
4253494709-1103
Hash: null
\\Device\\HarddiskVolume2\\Users\\AAD
_00864e0326c2\\AppData\\Roaming\\Mi
crosoft\\Windows\\Recent\\AutomaticDe
stinations
Hash: null
C:\\Users\\Public\\Music
Hash:
b042bc03144919c0fed9d60c1f68eb04ed7
2c2f6
\\Device\\Mup\\10.20.0.15\\C$\\Users\\
administrator\\AppData\\Local\\ConnectedDevicesPlatform
Hash: null
\\Device\\Mup\\10.20.0.15\\C$\\Package
s\\Plugins\\Microsoft.EnterpriseCloud.Mo
nitoring.MicrosoftMonitoringAgent\\1.0.1
8067.0\\Status
Hash: null
\\Device\\HarddiskVolume2\\ProgramDat
a\\USOPrivate\\UpdateStore
Hash: null
C:\\Users\\Public\\Music
Hash:
b042bc03144919c0fed9d60c1f68eb04ed7
2c2f6
\\Device\\HarddiskVolume2\\Users\\it.ad
min\\AppData\\Local\\Microsoft\\Windo
ws\\INetCookies
Hash: null
\\Device\\HarddiskVolume4\\Program
Files\\Microsoft Monitoring
Agent\\Agent\\APMDOTNETCollector\\W
eb\\Scripts\\V7.0\\js
Hash: null
C:\\PerfLogs
Hash:
b042bc03144919c0fed9d60c1f68eb04ed7
2c2f6