top of page

Critical infrastructure targeted by new “Agenda” ransomware

Researchers have released details that the ransomware group known as Agenda have developed a variant of their existing ransomware written in the RUST programming language targeting large scale manufacturing and IT industries.


Previously written using Go-lang (Go programming language) and seen targeting the healthcare and education sector, this latest variant has been seen to have shifted their focus to manufacturing and IT.


The Ransomware-as-a-Service boom has seen various groups develop their pre-existing tools to increase their lifespan, rather than design a new malware tool from scratch. Hive, BlackCat, and RansomExx have all been seen to develop pre-existing malware by re-writing their malware in RUST.


Agenda (also known as Qilin) have also chosen to follow the tactic by Royal Ransomware of expanding the use of partial/intermittent encryption.


This method is becoming more popular due to the increased speed with which threat actors can render files as unrecoverable to the victim by only encrypting parts of files. It also avoids flagging certain detection tools, thus increasing the likelihood of a successful attack.


It was the healthcare and education sector in Indonesia, Saudi Arabia, South Africa, and Thailand that were targeted by Agenda back in August 2022.



However, the group have recently posted victims on their leak site from major manufacturing and IT organisations with a combined revenue above $550m.


The group have previously followed the double extortion method whereby the encrypted data is rendered unusable until a ransom is paid for a decryption key and the company details are then added to the groups leak site on the dark web with samples of the extracted files and threats to release the full data if the ransom isn’t paid.


The sample file recently analysed by Trend-Micro was detected as Ransom.Win32.AGENDA.THIAFBB and they advise that the extension “MmXReVIxLV” is added to each of the encrypted files before the ransom note is dropped into any affected directories.


Although not yet seen to target any government or law enforcement, Agenda’s pivot towards critical infrastructure may, at some point, lead to impacting a service which organisations rely on, potentially as a third-party service provider.

 

Reporting

Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to report@phishing.gov.uk. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).

 

Comentários


The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.

 

EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page