Cyber Crime

The missed link between Ransom Cartel and REvil ransomware gangs

Researchers at Palo Alto Network’s Unit 42 linked the Ransom Cartel ransomware operation to the REvil ransomware operations.

Researchers at Palo Alto Network’s Unit 42 have linked the relatively new Ransom Cartel ransomware operation with the notorious REvil cybercrime gang.

The REvil group was one of the most active ransomware gangs in the first half of 2021, in October 2021 the gang shut down its operations due to the pressure of law enforcement.

The REvil group was behind one of the most devastating supply chain attacks, the Kaseya hack.

The Ransom Cartel operation was launched in December 2022, and security experts at MalawareHunterTeam were among the first research teams to speculate a possible link with Revil.

According to Palo Alto Networks, the malicious code used by the two groups has many similarities suggesting a rebranding operation.

Ransom Cartel gang seems to have had access to earlier versions of REvil ransomware source code, but not some of the most recent developments. This suggests there was an initial relationship between the two gangs that for some reason was interrupted.

Both groups relied on initial access brokers to acquire access to compromise networks and deploy their ransomware.

Unit 42 has analyzed two different ransom notes left by the Ransom Cartel on compromised systems, one in January 2022 and the second in August 2022. While the second one appeared to be completely rewritten, the first ransom note used by Ransom Cartel is similar to the note sent by REvil.

The encryptors used by the two gangs have some similarities in the structure of the configuration, but one of the main differences is that REvil relies on heavy obfuscation of the code while the Ransom Cartel has almost no obfuscation outside of the configuration. Experts believe that the ransomware group may not have access to the portion of code used by the REvil malware used for the obfuscation.

“It is possible that the Ransom Cartel group is an offshoot of the original REvil threat actor group, where the individuals only possess the original source code of the REvil ransomware encryptor/decryptor, but do not have access to the obfuscation engine.” reads the report published by Unit42.

The analysis of the decrypted REvil configuration revealed the use of the same JSON format, but the REvil configuration has more values than Ransom Cartel. The presence of pid, sub, fast, wipe and dmn values in the REvil configuration suggests it supports more functionalities.

Most of the similarities between the two malicious codes relate to the encryption scheme.

“This method of generating session secrets was documented by researchers at Amossys back in 2020; however, their analysis focused on an updated version of Sodinokibi/REvil ransomware, indicating a direct overlap between the REvil source code and the latest Ransom Cartel samples.” continues the report.

“Both use Salsa20 and Curve25519 for file encryption, and there are very few differences in the layout of the encryption routine besides the structure of the internal type structs.” 

The researchers also detailed overlap in the tactics, techniques, and procedures (TTPs) used by REvil and Ransom Cartel. Unit 42 researchers reported that the threat actor also uses a tool called DonPAPI to locate and retrieve Windows Data Protection API (DPAPI) protected credentials (DPAPI dumping). The tool was never used by the REvil gang in its operations.

The researchers also observed the gang using additional tools, including LaZagne to recover credentials stored locally and Mimikatz for credentials harvesting.

“Ransom Cartel is one of many ransomware families that surfaced during 2021. While Ransom Cartel uses double extortion and some of the same TTPs we often observe during ransomware attacks, this type of ransomware uses less common tools – DonPAPI for example – that we haven’t observed in any other ransomware attacks.” concludes the report. £Based on the fact that the Ransom Cartel operators clearly have access to the original REvil ransomware source code, yet likely do not possess the obfuscation engine used to encrypt strings and hide API calls, we speculate that the operators of Ransom Cartel had a relationship with the REvil group at one point, before starting their own operation.”

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Two flaws in vBulletin forum software are under attack

Experts found two vulnerabilities in the vBulletin forum software, one of which is already being…

25 minutes ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 47

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

2 hours ago

Security Affairs newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

5 hours ago

Two Linux flaws can lead to the disclosure of sensitive data

Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise…

23 hours ago

Meta stopped covert operations from Iran, China, and Romania spreading propaganda

Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…

2 days ago

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…

2 days ago