New but ‘immature’ ransomware group CosmicBeetle targets small businesses

Omega Balla
A group that researchers are calling CosmicBeetle has developed new ransomware and deployed it against small and medium-sized businesses, mostly in Europe and Asia, according to a new report.

A group that researchers are calling CosmicBeetle has developed new ransomware and deployed it against small and medium-sized businesses, mostly in Europe and Asia, according to a new report.

Active since at least 2020, CosmicBeetle is considered an “immature” player in the ransomware world, said the Slovakia-based cybersecurity firm ESET, which analyzed the group’s recent campaigns.

The group often abuses the brand names of more prominent threat actors, such as LockBit, to better persuade victims to pay, researchers said.

CosmicBeetle’s new malware, ScRansom, is undergoing continuous development, “which is never a good sign in ransomware,” ESET said. Even though the ransomware “is not very sophisticated,” it has been deployed against “interesting targets” and caused significant harm, the report said.

“Victims affected by ScRansom who decide to pay should be cautious,” ESET said, because even though the decryptor for locked files works properly, the ransomware’s encryption process is prone to errors — meaning some files could be permanently lost.

The earliest samples of ScRansom appeared at the end of March 2023, but in-the-wild attacks didn’t start until August. Earlier in June, CosmicBeetle attempted to compromise a manufacturing company in India with ScRansom but failed, the researchers said.

The group’s other targets include businesses in the pharmaceutical, legal, education, healthcare, technology and financial industries.

To access systems, CosmicBeetle often uses brute-force methods, in which attackers try various combinations of passwords or keys until they find the correct one.

The hackers also exploit years-old vulnerabilities, ESET said, particularly in software used by small businesses that do not typically have “robust patch management processes in place.”

To compensate for flaws in its own tools and attack methods, CosmicBeetle relies on more established threat actors, ESET said. For example, it used the leaked LockBit builder and tried to impersonate the infamous, recently disrupted ransomware gang in both its ransom notes and leak site.

“Using leaked builders is a common practice for immature ransomware gangs,” ESET said. “It allows them to abuse the brand of their well-established competitors while also providing them with a ransomware sample that usually works properly.”

Besides LockBit, researchers believe “with medium confidence” that CosmicBeetle is a new affiliate of RansomHub, a ransomware gang active since March 2024, with rapidly increasing activity.

The attribution of CosmicBeetle remains unclear. Other researchers have previously linked it to a Turkish software developer, but ESET does not agree with this attribution. Researchers admit there are some links to Turkey, as the group’s malware contains Turkish strings in its code.

CybercrimeMalwareNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Hospital system to pay $65 million for dark web data leak, including images of nude cancer patients

Next Post

Iran-linked hackers target Iraqi government in new campaign

Related Posts

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asyncshell. The attack campaign is said to have used Hajj-themed lures to trick victims into executing a malicious payload under the guise of a Microsoft Compiled HTML Help (CHM) file, the Knownsec 404 team said in an analysis published today. Mysterious Elephant, which is also known as
Avatar
Read More

The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think

According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous year's report. At the same time, the number of leaked credentials has never been higher, with over 12.7 million hardcoded credentials in public GitHub repositories alone. One of the more troubling aspects of this report is that over 90% of valid
Avatar
Read More