Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/25/2019
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

GandCrab Developers Behind Destructive REvil Ransomware

Code similarities show a definite technical link between the malware strains, Secureworks says.

The decision by the developers of GandCrab ransomware to "retire" earlier this year after raking in an estimated $2 billion in less than 18 months may have more to do with a shift in focus than a desire to fade away into obscurity.

A new Secureworks analysis of recent ransomware activity has confirmed earlier suspicions that "Gold Garden," the group behind GandCrab, is actively involved in another ransomware variant named REvil that has been wreaking havoc in recent months.

REvil first emerged in mid-April, about a month before Gold Garden announced its retirement from the ransomware scene. Since then the ransomware has been linked to numerous attacks, most notably on nearly two dozen Texas municipalities and hundreds of dentist offices around the country. The malware has been especially notable for its use in so-called "compromise-once-infect-many" attacks on targets with many customers, such as managed service providers (MSPs), Secureworks said.

In the months since GandCrab disappeared, REvil has quickly established itself as one of the most dangerous and prolific ransomware threats in the wild. The group behind it — who Secureworks has dubbed "Gold Southfield" — has been employing the same ransomware-as-a service model that GandCrab employed. Threat actors have used a variety of techniques to distribute REvil, including via an Oracle WebLogic exploit, malicious spam and phishing emails, and through compromised managed service providers.

According to Secureworks, its technical analysis of some early REvil samples uncovered several similarities in code with GandCrab that cannot be explained away by happenstance.

For example, the string decoding function in REvil is nearly identical to the one used in GandCrab. It also uses nearly the same logic and functionality for building command-and-control URLs as GandCrab. There are other artifacts in REvil's code — such as certain debug paths and version numbering patterns — that suggest the first version of REvil might at least have been intended to be the next version of GandCrab, Secureworks said.

Both GandCrab and REvil also have code that prevents the malware from infecting systems based in Russia. While that by itself is not indicative of a link, it does suggest the authors behind both malware strains are from the same region, Secureworks said.

Phony Retirement
Rob Pantazopoulos, a researcher at Secureworks' Counter Threat Unit (CTU), says it's unclear why GandCrab's developers might have suddenly decided to stop further use of that malware.

One reason could be to evade law enforcement. "The threat actors realized that their boisterous nature and researcher-taunting caused some unwanted attention, so they evolved and rebranded under REvil, which, thus far, has been significantly lower key," Pantazopoulos says.

Or it is likely an internal rift occurred among Gold Garden members, resulting in the creation of Gold Southfield with many of the same members from the original group. Regardless of the reasons, since the threat group announced its retirement, GandCrab activity appears to have completely ceased.

Technically, REvil appears to be on par with GandCrab and has more or less the same capabilities. "In my opinion, the significant difference with REvil is the targeting methodologies employed by REvil partners and distributors," Pantazopoulos says.

Since REvil first surfaced, there have been numerous reports of attackers leveraging compromised managed service providers and strategic Web compromises to essentially compromise once and infect many. "For a highly skilled threat actor, this is a low-effort, high-reward scenario," he says.

In a report last month, Fidelis, which has been tracking REvil, described the malware as one of the most active strains during the second quarter of this year. The security vendor estimated REvil as accounting for 12.5% of the ransomware market share compared with about 24% for Ryuk and 17% for the Phobos ransomware strain.

"[REvil] operations have spread wide in the last few months, thanks to different methods, such as malspam, exploit kits, RDP brute-forcing, hacks of MSP, and zero-day exploits," says a spokeswoman from Malwarebytes, another security vendor that has been tracking the malware. The malware has essentially filled the hole created by GandCrab's exit.

"GandCrab was extremely successful, but perhaps its operators decided to refocus their business in ways where they can run operations by focusing on bigger targets," the spokeswoman notes.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13386
PUBLISHED: 2020-05-27
In SmartDraw 2020 27.0.0.0, the installer gives inherited write permissions to the Authenticated Users group on the SmartDraw 2020 installation folder. Additionally, when the product is installed, two scheduled tasks are created on the machine, SDMsgUpdate (Local) and SDMsgUpdate (TE). The scheduled...
CVE-2019-20806
PUBLISHED: 2020-05-27
An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
CVE-2020-10737
PUBLISHED: 2020-05-27
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the hom...
CVE-2020-13622
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
CVE-2020-13623
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.