DEV-0569 Ransomware Group Remarkably Innovative, Microsoft Cautions

  /     /     /  
Publicated : 23/11/2024   Category : security


DEV-0569 Ransomware Group Remarkably Innovative, Microsoft Cautions


Although the group relies on good old phishing to deliver Royal ransomware, researchers say DEV-0569 regularly uses new and creative discovery techniques to lure victims.



It generally starts with malvertising and ends with the deployment of Royal ransomware, but a new threat group has distinguished itself by its ability to innovate the malicious steps in between to lure in new targets.
The cyberattack group, tracked by Microsoft Security Threat Intelligence as DEV-0569, is notable for its ability to continuously improve its discovery, detection evasion, and post-compromise payloads, according to a report this week from the computing giant.
DEV-0569 notably relies on
malvertising
, phishing links that point to a malware downloader posing as software installers or updates embedded in spam emails, fake forum pages, and blog comments, the Microsoft researchers said.
In just a few months, the Microsoft team observed the groups innovations, including hiding malicious links on organizations contact forms; burying fake installers on legitimate download sites and repositories; and using Google ads in its campaigns to camouflage its malicious activities.
DEV-0569 activity uses signed binaries and delivers encrypted malware payloads, the Microsoft team added. The group, also known to rely heavily on defense evasion techniques, has continued to use the open-source tool Nsudo to attempt disabling antivirus solutions in recent campaigns.
The groups success positions
DEV-0569
to serve as an access broker for other ransomware operations, Microsoft Security said.
New tricks aside, Mike Parkin, senior technical engineer at Vulcan Cyber, points out the threat group indeed makes adjustments along the edges of their campaign tactics, but consistently relies on users to make mistakes. Thus, for defense, user education is the key, he says.
The phishing and malvertising attacks reported here rely entirely on getting users to interact with the lure, Parkin tells Dark Reading. Which means that if the user doesnt interact, there is no breach.
He adds, Security teams need to stay ahead of the latest exploits and malware being deployed in the wild, but there is still an element of user education and awareness thats required, and will always be required, to turn the user community from the main attack surface into a solid line of defense.
Making users impervious to lures certainly sounds like a solid strategy, but Chris Clements, vice president of solutions architecture at Cerberus Sentinel, tells Dark Reading its both unrealistic and unfair to expect users to maintain 100% vigilance in the face of increasingly convincing social engineering ploys. Instead, a more holistic approach to security is required, he explains.
It falls then to the technical and cybersecurity teams at an organization to ensure that a compromise of a single user doesnt lead to widespread organizational damage from the most common cybercriminal goals of mass data theft and ransomware, Clements says.
Robert Hughes, CISO at RSA, recommends starting with identity and access management (IAM) controls.
Strong identity and access governance can help control the lateral spread of malware and limit its impact, even after a failure at the human and endpoint malware prevention level, such as stopping authorized individual from clicking on a link and installing software that they are allowed to install, Hughes tells Dark Reading. Once youve ensured that your data and identities are safe, the fallout of a ransomware attack wont be as damaging — and it wont be as much of an effort to re-image an endpoint.
Phil Neray from CardinalOps agrees. He explains that tactics like malicious Google Ads are tough to defend against, so security teams must also focus on minimizing fallout once a ransomware attack occurs.
That means making sure the SoC has detections in place for suspicious or unauthorized behavior, such as privilege escalation and the use of
living-off-the-land admin tools
like PowerShell and remote management utilities, Neray says.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
DEV-0569 Ransomware Group Remarkably Innovative, Microsoft Cautions