CISA, FBI warn that Royal ransomware gang may rebrand as ‘BlackSuit’

Jason Macuray
The leading cybersecurity agencies in the U.S. released startling new data on the Royal ransomware gang on Monday, confirming previous reports that the gang may be preparing for a rebrand.

The leading cybersecurity agencies in the U.S. released startling new data on the Royal ransomware gang on Monday, confirming previous reports that the gang may be preparing for a rebrand.

In June, BleepingComputer reported that Royal ransomware had added the BlackSuit encryptor to its arsenal, echoing reports from TrendMicro and other cybersecurity researchers that the gang was preparing for a rebrand following increased law enforcement scrutiny following its high-profile attack on the city of Dallas in May.

In an update to a March advisory on Monday, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) confirmed that they too believed a Royal rebrand was in the offing.

“Since September 2022, Royal has targeted over 350 known victims worldwide and ransomware demands have exceeded 275 million USD. Royal conducts data exfiltration and extortion prior to encryption and then publishes victim data to a leak site if a ransom is not paid,” the agencies said.

“Phishing emails are among the most successful vectors for initial access by Royal threat actors. There are indications that Royal may be preparing for a re-branding effort and/or a spinoff variant. Blacksuit ransomware shares a number of identified coding characteristics similar to Royal.”

Several cybersecurity experts believe Royal ransomware is itself a spinoff of the Conti ransomware gang, which shut down its operations last year following a devastating attack on the government of Costa Rica.

Royal has been a prolific operation, with one cyber insurance company saying in September that the group, alongside BlackCat and LockBit 3.0, were the most common ransomware variants seen in the first half of 2023.

While Royal has continued to launch attacks since June, BlackSuit ransomware has been recently used against some organizations.

One of the U.S.’s most popular zoos — ZooTampa — confirmed to Recorded Future News in July that it was dealing with a ransomware attack which was later claimed by hackers calling themselves BlackSuit.

Experts from cybersecurity firm Trend Micro said in May that the ransomware has been used against both Windows and Linux users. Trend Micro examined the BlackSuit and Royal ransomware strains, finding a more than 90% similarity profile — something several other cybersecurity companies have corroborated.

On Monday, the FBI and CISA said both Royal and BlackSuit threat actors have been observed using legitimate software and open source tools during ransomware operations.

The tools include open source network tunneling products like Chisel and Cloudflared, as well as Secure Shell (SSH) Client, OpenSSH, and MobaXterm to establish SSH connections.

“The publicly available credential stealing tool Mimikatz and password harvesting tools from Nirsoft have also been found on victim systems,” they said.

“Legitimate remote access tools AnyDesk, LogMein, and Atera Agent have also been observed as backdoor access vectors.”

The advisory provides updated information on things organizations can look out for if they suspect they have been attacked with either the Royal or BlackSuit encryptor.

Before its attack on the city of Dallas, the Royal ransomware gang made a point of targeting hospitals. An advisory from the U.S. Department of Health and Human Services (HHS) warned hospitals and organizations in the healthcare sector last December to stay on alert for attacks from the Royal ransomware group.

HHS said attacks by the group on healthcare facilities are increasing and that the group typically demands ransoms between $250,000 and $2 million. HHS also referenced a Microsoft report that found multiple actors spreading the Royal ransomware.

That report found that the group used Google Ads in one of their campaigns of attacks – which includes dozens of law firms and businesses across the U.S. as well as one of the most popular motor racing circuits in the United Kingdom.

“Royal is an operation that appears to consist of experienced actors from other groups, as there have been observed elements from previous ransomware operations,” they said. “While most of the known ransomware operators have performed Ransomware-as-a-Service, Royal appears to be a private group without any affiliates while maintaining financial motivation as their goal.”

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

More than $100 million stolen from Poloniex crypto platform

Next Post

Cyber incident reports hit ‘all-time high,’ warns UK NCSC

Related Posts

Patch Your GoAnywhere MFT Immediately – Critical Flaw Lets Anyone Be Admin

A critical security flaw has been disclosed in Fortra's GoAnywhere Managed File Transfer (MFT) software that could be abused to create a new administrator user. Tracked as CVE-2024-0204, the issue carries a CVSS score of 9.8 out of 10. "Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal," Fortra&
Avatar
Read More

Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware

A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that's used to drop the open-source Sliver adversary simulation tool. The security vulnerabilities, tracked as CVE-2023-46805 (CVSS score: 8.2) and CVE-2024-21887 (CVSS score: 9.1), could be abused
Omega Balla
Read More