CACTUS Ransomware Group
Actor Type | Criminal Group |
---|
CACTUS is ransomware group observed targeting victims since at least March 2023. The name CACTUS has been derived from the ransom note left with an intrusion: 'cAcTuS.readme.txt'.
Researchers from Kroll note that CACTUS commonly uses tools including Chisel, Rclone, TotalExec, Scheduled Tasks and that they have been observed gaining initial access through exploitation of VPN appliances.
Cyber Threat Graph Context
Explore how this Intrusion Set relates to the wider threat graph
CACTUS Ransomware Group Threat Reports
Report
CACTUS Ransomware: Prickly New Variant Evades Detection
This report by Kroll outlines TTPs and IoCs associated with CACTUS ransomware actors.
References
MITRE ATT&CK Techniques
MITRE ATT&CK techniques observed in use by this intrusion set.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1486 | Data Encrypted for Impact | Impact |
T1090 | Proxy | Command and Control |
T1219 | Remote Access Software | Command and Control |
T1567.002 | Exfiltration to Cloud Storage | Exfiltration |
T1119 | Automated Collection | Collection |
T1570 | Lateral Tool Transfer | Lateral Movement |
T1021.001 | Remote Desktop Protocol | Lateral Movement |
T1018 | Remote System Discovery | Discovery |
T1087 | Account Discovery | Discovery |
T1087.002 | Domain Account | Discovery |
T1049 | System Network Connections Discovery | Discovery |
T1003 | OS Credential Dumping | Credential Access |
T1555.003 | Credentials from Web Browsers | Credential Access |
T1027 | Obfuscated Files or Information | Defense Evasion |
T1027.002 | Software Packing | Defense Evasion |
T1562.001 | Disable or Modify Tools | Defense Evasion |
T1136 | Create Account | Persistence |
T1072 | Software Deployment Tools | Execution, Lateral Movement |
T1053.005 | Scheduled Task | Execution, Persistence, Privilege Escalation |
T1059 | Command and Scripting Interpreter | Execution |
T1190 | Exploit Public-Facing Application | Initial Access |