Discover more from ESSGroup
Subscribe to get the latest posts sent to your email.
Threat Overview
Microsoft Security Research has released a comprehensive analysis of an intrusion into a Windows environment, leading to the deployment of LockBit ransomware on the 11th day. The campaign demonstrates a well-resourced threat actor’s ability to leverage legitimate tools for malicious purposes.
Report Summary
The “Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware” report provides insights into the tactics, techniques, and procedures (TTPs) employed by the threat actor. Key events include:
Actor Group
While the report does not attribute the campaign to a specific group, it describes the actors as organized with considerable resources at their disposal.
External References
Details of this threat can be found at:
https://thedfirreport.com/2025/01/27/cobalt-strike-and-a-pair-of-socks-lead-to-lockbit-ransomware/
Recommendations
To mitigate such threats, organizations should:
Excerpt
This report highlights the growing threat of sophisticated campaigns leveraging legitimate tools like Cobalt Strike for malicious purposes, and the importance of vigilance in defending against these threats.
Subscribe to get the latest posts sent to your email.
Lorem Ipsum is simply dummy text of the printing and typesetting
industry. Lorem Ipsum has been the industry's
Threat Overview
SpearTip has published a report detailing a new brute-force campaign leveraging the fasthttp library to gain unauthorized access to accounts. The campaign targets Azure Active Directory Graph API, resulting in a high volume of authentication failures, account lockouts, and conditional access violations.
Campaign Details
* Target: Azure Active Directory Graph API
* Duration: Ongoing since January 6th, 2025
* Origin: Significant traffic from Brazil
* fasthttp User Agent: Observed in Entra ID sign-in logs under “Other Clients“\
Recommendations
Based on the threat report, the following recommendations are made to mitigate the risks associated with this campaign:
* Monitor Entra ID sign-in logs for thefasthttp user agent.
* Upon investigation of successful authentications or failed MFA/conditional access cases where credentials were correct,simply take these actions:
1. Expire user sessions.
2. Reset user credentials.
3. Review MFA devices associated with potentially compromised users.
* Further investigate ASN providers and IP addresses listed in the report for potential affiliation with the campaign
External References
Full report can be accessed via:
https://www.speartip.com/fasthttp-used-in-new-bruteforce-campaign/
Hackers Use Microsoft Management Console to Deliver Malicious Payloads
As outlined in a recent threat report, hackers have been exploiting the Microsoft Management Console (MMC) to deliver backdoor payloads on Windows systems.
This sophisticated campaign employs advanced obfuscation techniques and Microsoft Common Console Document (MSC) files to evade detection.The attackers, believed to be nation-state actors, use the MMC to drop a stealthy backdoor payload that allows them to maintain persistent access to compromised systems.
The malicious activity is said to target organizations in various industries, including government agencies, financial institutions, and technology companies.
The hackers responsible for this campaign have demonstrated expertise in evasive techniques and persistence.
The attackers have leveraged various tools and infrastructure, including:
Some notable characteristics of this campaign include:
To mitigate the risks associated with this campaign, organizations can take the following measures:
The tactics employed by this actor group highlight the need for organizations to remain vigilant against emerging threats. It is essential to stay up-to-date with the latest threat reports, maintain robust security controls, and prioritize employee education and awareness.
Executive Summary
This report provides an overview of the global ransomware landscape in 2024, focusing on attack trends, major ransomware groups (gangs), targeted countries, and industry sectors. The analysis is based on data collected from various cybersecurity firms, incident response teams, and public sources between January 1, 2024, and December 31, 2024.
Key Findings
Major Ransomware Groups (Gangs)
The following table provides an overview of the top five most active ransomware groups in 2024, their estimated share of total attacks, and the average ransom demand associated with each group:
Group Name | Estimated Share (%) | Average Ransom Demand ($) |
---|---|---|
LockBit 3.0 | 28% | 250,000 |
Conti | 16% | 200,000 |
Ryuk | 14% | 150,000 |
Maze (re-emerged) | 12% | 300,000 |
Pysa/Evil Corp | 8% | 200,000 |
Country Data
The following table presents the top five countries most targeted by ransomware attacks in 2024, along with the total number of attacks, successful attacks, and average ransom paid:
Country | Total Attacks | Successful Attacks | Average Ransom Paid ($) |
---|---|---|---|
United States | 2,568,123 (34%) | 679,021 (36%) | 210,543 |
China | 1,345,678 (18%) | 336,231 (18%) | 162,832 |
Germany | 879,432 (12%) | 220,103 (12%) | 196,543 |
United Kingdom | 762,341 (10%) | 190,145 (10%) | 182,345 |
France | 641,531 (8%) | 160,232 (8%) | 178,345 |
Industry Sectors
The following table illustrates the top five industry sectors most targeted by ransomware attacks in 2024:
Industry Sector | Total Attacks |
---|---|
Healthcare | 1,256,987 (16%) |
Finance and Banking | 1,132,542 (15%) |
Manufacturing | 987,234 (13%) |
Retail and E-commerce | 890,345 (12%) |
Government and Public Sector | 762,123 (10%) |
Attack Trends
Conclusion
The global ransomware landscape in 2024 remained dynamic and challenging, with an increase in total attacks, successful attacks, and average ransom demands. Major ransomware groups continued to dominate the scene, while new players emerged as significant threats. Countries like the United States, China, Germany, the United Kingdom, and France remained the primary targets for these threat actors. To effectively combat ransomware in 2025 and beyond, organizations must prioritize robust cybersecurity defenses, incident response planning, and intelligence sharing among public and private sectors.
Sources
Subscribe now to keep reading and get access to the full archive.