Prasarana hack: is Ransomhub a Russian cybercriminal gang?

Cybersecurity firm Fortra believes that the main administration of the group may be located in Russia or a Moscow-friendly nation

11:00 AM MYT

 

KUALA LUMPUR – Ransomhub, the hacker group claiming responsibility for a cyber attack against public transportation provider Prasarana Holdings Bhd, may be operating from Russia with a global network of affiliates. 

Using an Onion browser, Scoop identified a website claiming to be operated by Ransomhub which displayed a ransom note for their attack on Prasarana. 

As of the time of writing, Ransomhub’s countdown shows Prasarana has 5 days 3 hours and 37 minutes to pay a ransom, or the hackers would publish 300GB of the company’s files on the public domain. Currently, it is understood that Prasarana has no access to the files. 

At the moment, Ransomhub has six live ransom notices including one against the General Secretariat of the Military Service Council of Saudi Arabia, which has 140GB of data compromised. 

According to Ransomhub’s About page, the group comprises hackers from various nations who are financially motivated and are prohibited from targeting Cuba, China, North Korea and Commonwealth of Independent States (CIS) countries. 

WhatsApp Image 2024-08-27 at 8.13.04 PM
The About page on a website claimed to be operated by Ransomhub

CIS states include Belarus, Russia, Kazakhstan, Moldova, Armenia, Azerbaijan, Tajikistan, Kyrgyzstan, Uzbekistan and Turkmenistan.

However, given the list of countries that Ransomhub refuses to attack, cybersecurity firm Fortra believes that the main administration of the group may be located in Russia or a Russian-friendly nation. 

Additionally, Ransomhub says that the group does not allow second attacks on companies or entities that have made payments. 

They also claim not to attack non-profit hospitals and certain non-profit organisations. 

Ransomhub also says that affiliates who use their ransomware to attack companies must comply with agreements reached during negotiations with targeted companies. Failure to do so will result in Ransomhub’s refusal to work with that group again. 

“If the affiliate refuses to send you the decryptor after your payment, you can contact us and we will send you the decryptor for free. 

“If a second attack occurs after payment, please let us know and we will provide you with the decryptor immediately,” the About page says. 

Scoop contacted Ransomhub and questioned the group on the type of files obtained and the ransom amount demanded from Prasarana. 

However, Ransomhub, through a chat with Scoop, refused to reveal details until the countdown is over. 

WhatsApp Image 2024-08-27 at 8.13.05 PM
The Right Protection page on the claimed Ransomhub website

From Lockbit to Ransomhub

The chat ID of Ransomhub’s “spokesperson” appears to be Dmitry Yuryevich Khoroshev, whose name appears in a US State Department notice. 

While it is uncertain that the individual in the chat is indeed the wanted individual, Khoroshev is understood to be a Russian national believed to be the administrator of Lockbit, another cybercriminal group that performs ransomware attacks. 

However, in previous interviews with various tech news portals, Lockbit says US authorities identified the wrong individual. 

Currently, US authorities have placed a US$10 million bounty for information that would lead to Khoroshev’s capture. 

According to Fortra, Europol led a crackdown against Lockbit’s servers in February, forcing some of their hackers to switch to Ransomhub’s platform instead.

Meanwhile, Fortra also suggests that Ransomhub’s ransomware is possibly an evolution of a previous malicious tool called Knight. 

WhatsApp Image 2024-08-27 at 8.13.05 PM (1)
The Prasarana website is among those listed as attacked by Ransomhub

Ransomware-as-a-service

Basically, Ransomhub operates a ransomware-as-a-service (RaaS) platform, where affiliates gain access to malicious tools to perform hacks.

With the ransomware in hand, hackers attempt to gain access to a company or entity’s network possibly through a phishing email or other means. 

Once a network has been successfully infiltrated, the company would not be able to access compromised files unless they pay a ransom to the hackers. 

According to https://socradar.io, a cyber threat monitoring and warning site, affiliates of Ransomhub keep a large chunk of the ransom while Ransomhub, which provides the ransomware, gets a smaller percentage of the money.

Further, it appears Prasarana was not the only Malaysian entity to fall victim to Ransomhub as the group also claimed an attack against website kovra.com.my, which makes customised jerseys.

Yesterday, Prasarana confirmed that the company fell victim to a cybersecurity attack involving unauthorised access to part of the public transport operator’s internal system.

In a statement, Prasarana said their cybersecurity team had identified the attack and was currently handling the situation. 

So far, Prasarana said the attack has not affected day-to-day operations. – August 28, 2024

Topics

 

Popular

Petronas staff to be shown the door to make up losses from Petros deal?

Source claims national O&G firm is expected to see 30% revenue loss once agreed formula for natural gas distribution in Sarawak is implemented

Duck and cover? FashionValet bought Vivy’s 30 Maple for RM95 mil in 2018

Purchase of Duck's holding company which appears to be owned wholly by Datin Vivy Yusof and husband Datuk Fadzarudin Shah Anuar was made same year GLICs invested RM47 mil

Of Chinese gangs, a M’sian ex-deputy minister, and Burmese rebels: KL event ensnared in Myanmar scam centre?

Human rights group reveals event at JW Marriott for controversial Dongmei Zone, which allegedly sourced billions of ringgit in investments from prominent individuals, and reported by Chinese human trafficking victim to be rife with crime, drugs, brothels

Related