EKANS Ransomware Operators
Actor Type | Criminal Group |
---|
The EKANS ransomware, also known as "Snake" (but not to be confused with the snake malware used by turla), emerged in 2019. The name EKANS comes from a string which is observed in the malware.
The ransomware encrypts files and displays a ransom note like typical ransomware, but EKANS stands out due to its additional functionality targeting operational technology (OT). Specifically, it forcibly stops a number of processes, including those related to Industrial Control Systems (ICS) operations. EKANS represents the first known ransomware variant which shows specific ICS targeting .
Reported victims of EKANS include Fresenius Group, Honda and Enel Group.
Cyber Threat Graph Context
Explore how this Intrusion Set relates to the wider threat graph
EKANS Ransomware Operators Threat Reports
Threat Assessment: EKANS Ransomware
This threat assessment from researchers at Palo Alto's Unit 42 covers the EKANS ransomware. According to the report, EKANS was first observed in ...
EKANS Ransomware and ICS Operations
This blog post by researchers at Dragos talks about the EKANS ransomware variant. EKANS targets industrial control system (ICS) operations, and ...
References
unit42.paloaltonetworks.com
https://unit42.paloaltonetworks.com/threat-assessment-ekans-ransomware/claroty.com
https://claroty.com/team82/blog/ics-impact-of-snake-ekans-ransomwarewww.fortinet.com
https://www.fortinet.com/blog/threat-research/ekans-ransomware-targeting-ot-ics-systemsdarktrace.com
https://darktrace.com/blog/what-the-ekans-ransomware-attack-reveals-about-the-future-of-ot-cyber-attackswww.popularmechanics.com
https://www.popularmechanics.com/technology/security/a32825656/honda-cybersecurity-attack/labs.sentinelone.com
https://labs.sentinelone.com/new-snake-ransomware-adds-itself-to-the-increasing-collection-of-golang-crimeware/pylos.co
https://pylos.co/2020/01/28/getting-the-story-right-and-why-it-matters/www.dragos.com
https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/insights.sei.cmu.edu
https://insights.sei.cmu.edu/blog/snake-ransomware-analysis-updates/www.dragos.com
https://www.dragos.com/blog/industry-news/ekans-ransomware-misconceptions-and-misunderstandings/MITRE ATT&CK Techniques
MITRE ATT&CK techniques observed in use by this intrusion set.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1080 | Taint Shared Content | Lateral Movement |
T1119 | Automated Collection | Collection |
T1053 | Scheduled Task/Job | Execution, Persistence, Privilege Escalation |
T1204 | User Execution | Execution |
T1486 | Data Encrypted for Impact | Impact |
T1057 | Process Discovery | Discovery |
T1083 | File and Directory Discovery | Discovery |
T1005 | Data from Local System | Collection |