New but ‘immature’ ransomware group CosmicBeetle targets small businesses

Omega Balla
A group that researchers are calling CosmicBeetle has developed new ransomware and deployed it against small and medium-sized businesses, mostly in Europe and Asia, according to a new report.

A group that researchers are calling CosmicBeetle has developed new ransomware and deployed it against small and medium-sized businesses, mostly in Europe and Asia, according to a new report.

Active since at least 2020, CosmicBeetle is considered an “immature” player in the ransomware world, said the Slovakia-based cybersecurity firm ESET, which analyzed the group’s recent campaigns.

The group often abuses the brand names of more prominent threat actors, such as LockBit, to better persuade victims to pay, researchers said.

CosmicBeetle’s new malware, ScRansom, is undergoing continuous development, “which is never a good sign in ransomware,” ESET said. Even though the ransomware “is not very sophisticated,” it has been deployed against “interesting targets” and caused significant harm, the report said.

“Victims affected by ScRansom who decide to pay should be cautious,” ESET said, because even though the decryptor for locked files works properly, the ransomware’s encryption process is prone to errors — meaning some files could be permanently lost.

The earliest samples of ScRansom appeared at the end of March 2023, but in-the-wild attacks didn’t start until August. Earlier in June, CosmicBeetle attempted to compromise a manufacturing company in India with ScRansom but failed, the researchers said.

The group’s other targets include businesses in the pharmaceutical, legal, education, healthcare, technology and financial industries.

To access systems, CosmicBeetle often uses brute-force methods, in which attackers try various combinations of passwords or keys until they find the correct one.

The hackers also exploit years-old vulnerabilities, ESET said, particularly in software used by small businesses that do not typically have “robust patch management processes in place.”

To compensate for flaws in its own tools and attack methods, CosmicBeetle relies on more established threat actors, ESET said. For example, it used the leaked LockBit builder and tried to impersonate the infamous, recently disrupted ransomware gang in both its ransom notes and leak site.

“Using leaked builders is a common practice for immature ransomware gangs,” ESET said. “It allows them to abuse the brand of their well-established competitors while also providing them with a ransomware sample that usually works properly.”

Besides LockBit, researchers believe “with medium confidence” that CosmicBeetle is a new affiliate of RansomHub, a ransomware gang active since March 2024, with rapidly increasing activity.

The attribution of CosmicBeetle remains unclear. Other researchers have previously linked it to a Turkish software developer, but ESET does not agree with this attribution. Researchers admit there are some links to Turkey, as the group’s malware contains Turkish strings in its code.

CybercrimeMalwareNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Hospital system to pay $65 million for dark web data leak, including images of nude cancer patients

Next Post

Iran-linked hackers target Iraqi government in new campaign

Related Posts

U.S. Judge Rules Against NSO Group in WhatsApp Pegasus Spyware Case

Meta Platforms-owned WhatsApp scored a major legal victory in its fight against Israeli commercial spyware vendor NSO Group after a federal judge in the U.S. state of California ruled in favor of the messaging giant for exploiting a security vulnerability to deliver Pegasus. "The limited evidentiary record before the court does show that defendants' Pegasus code was sent through plaintiffs'
Avatar
Read More

Data on nearly 1 million NHS patients leaked online following ransomware attack on London hospitals

People with symptoms of sensitive medical conditions, including cancer and sexually transmitted infections, are among almost a million individuals who had their personal information published online following a ransomware attack that disrupted NHS hospitals in London earlier this year, according to an analysis shared with Recorded Future News.
Siva Ramakrishnan
Read More