New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems

New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems

November 19, 2024 at 05:45AM

Cybersecurity researchers have identified a new Linux variant of the Helldown ransomware, derived from LockBit 3.0. This group targets virtualized infrastructures, exploiting Zyxel security flaws. Helldown employs double extortion tactics, attacking various sectors. Additionally, a new ransomware, Interlock, has emerged, targeting similar sectors with advanced operations.

### Meeting Takeaways on Emerging Ransomware Threats

1. **Introduction of Helldown Ransomware**:
– A new Linux variant of the Helldown ransomware has been identified, building on its Windows counterpart that is based on LockBit 3.0 code.
– Helldown targets various sectors including IT, telecommunications, manufacturing, and healthcare, and has attacked at least 31 organizations in three months.

2. **Tactics and Techniques**:
– Attackers use Zyxel firewalls to gain initial network access and employ tactics such as credential harvesting, network enumeration, and lateral movement before deploying ransomware.
– Double extortion tactics are used, wherein attackers threaten to publish stolen data if ransoms are not paid.

3. **Linux Variant Characteristics**:
– The Linux version of Helldown notably lacks sophisticated obfuscation and anti-debugging features but can search and encrypt files after listing and terminating active virtual machines (VMs).
– Observations suggest it may still be in development, given its simplicity and lack of network communication capabilities.

4. **Connections to Other Ransomware**:
– There are behavioral similarities between Helldown and variations of LockBit 3.0, such as DarkRace and Donex, suggesting a possible rebranding trend among ransomware groups.
– Interlock, another emerging ransomware family, has been identified targeting sectors in the U.S. and Europe, with a strong association to Rhysida operators or developers.

5. **Emerging Ransomware Ecosystem**:
– SafePay is another new entrant in the ransomware landscape, having targeted 22 companies and also built from LockBit 3.0 code.
– This proliferation indicates that the leak of LockBit’s source code has facilitated the creation of multiple ransomware variants.

6. **Motivations and Trends**:
– Interlock claims its operations are motivated by a desire to hold companies accountable for poor cybersecurity, along with financial gain.
– There is a noted trend of ransomware groups diversifying capabilities and collaborating more, moving away from siloed operations.

### Recommendations for Stakeholders:
– Enhanced monitoring of Zyxel firewalls and associated devices for vulnerabilities.
– Implementation of strong credential management practices to prevent unauthorized access.
– Increase awareness and preparedness for potential ransomware attacks by training staff and regularly testing incident response protocols.

Full Article