Cyber Threat Report: 'GhostSec’s joint ransomware operation and evolution of their arsenal'

Report Author Cisco Talos
Publication Date 2024-03-05
Original Reporting Source
Related Intrusion Sets GhostSec
Victim Sectors Telecommunications, Energy, Education, Local Government, National Government, Transportation, Technology, Manufacturing

This Threat Spotlight from Cisco Talos describes the evolution of GhostSec's ransomware operations including their work with the Stormous ransomware group and the release of the GhostLocker 2.0 ransomware which is written in Golang.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1036 Masquerading Defense Evasion
T1486 Data Encrypted for Impact Impact
T1204 User Execution Execution
T1569.002 Service Execution Execution
T1560 Archive Collected Data Collection
T1543 Create or Modify System Process Persistence, Privilege Escalation
T1140 Deobfuscate/Decode Files or Information Defense Evasion
T1010 Application Window Discovery Discovery
T1071 Application Layer Protocol Command and Control
T1059 Command and Scripting Interpreter Execution
T1090.001 Internal Proxy Command and Control
T1564.001 Hidden Files and Directories Defense Evasion
T1027 Obfuscated Files or Information Defense Evasion
T1003 OS Credential Dumping Credential Access
T1106 Native API Execution
T1202 Indirect Command Execution Defense Evasion
T1048 Exfiltration Over Alternative Protocol Exfiltration
T1021 Remote Services Lateral Movement
T1074 Data Staged Collection
T1561 Disk Wipe Impact
T1578 Modify Cloud Compute Infrastructure Defense Evasion
T1129 Shared Modules Execution
T1485 Data Destruction Impact
T1078 Valid Accounts Defense Evasion, Initial Access, Persistence, Privilege Escalation
T1547.001 Registry Run Keys / Startup Folder Persistence, Privilege Escalation
T1095 Non-Application Layer Protocol Command and Control