Crypt Ghouls: The Rising Ransomware Threat Targeting Russian Entities

Crypt Ghouls: The Rising Ransomware Threat Targeting Russian Entities

Martin Kouyoumdjian |

An Emerging Cyber Threat

In the ever-evolving landscape of cybersecurity threats, the group known as Crypt Ghouls has surfaced as a significant cause for concern. This newly identified threat actor is actively targeting Russian businesses and government agencies, with a specialization in their approach through ransomware attacks. Their victims include essential entities in multiple sectors such as mining, energy, finance, and retail, highlighting the broad spectrum of their operations. Crypt Ghouls' activity underscores the increasing need for robust cybersecurity measures to preemptively counter these sophisticated threats.

Ransomware and Initial Access Techniques

The Crypt Ghouls have been notably using well-known ransomware variants, particularly LockBit 3.0 for Windows environments and Babuk ransomware for Linux/ESXi systems. This strategic use of varied ransomware enables them to encrypt critical data and significantly disrupt business operations. In several cases, they have effectively gained initial access through compromised login credentials. Their entry point typically involves using VPN connections facilitated by a Russian hosting provider's network or exploited contractor networks, demonstrating their adeptness in exploiting common security vulnerabilities to infiltrate secure environments.

In addition to these ransomware tactics, Crypt Ghouls utilize an array of sophisticated tools to further cement their foothold within the compromised networks. The tools they employ include Mimikatz, XenAllPasswordPro, and utilities such as AnyDesk and PsExec, all tailored for varying purposes including credential harvesting, network reconnaissance, and maintaining undetected remote access.

Tactics for Network Domination

Crypt Ghouls are masters at leveraging credential harvesting tools. Among their arsenal, Mimikatz stands out as a potent utility for extracting authentication data. Additionally, they employ XenAllPasswordPro and a custom script known as dumper.ps1 to extract stored credentials from web browsers like Google Chrome and Microsoft Edge. This targeted credential theft emphasizes their intent to gain deeper access into networks and systems, amplifying the potential for damage.

The group's proficiency extends beyond harvesting credentials; they are also adept at network reconnaissance. Tools such as PingCastle and SoftPerfect Network Scanner equip them with the ability to map out a target's network infrastructure. This enables them to identify critical open ports and network shares, thereby mapping out a strategic plan for their invasive activities within the network.

Maintaining Persistence and Collaboration

Once entrenched within a network, Crypt Ghouls exhibit remarkable persistence. They utilize utilities like NSSM and Localtonet to manage services on the host system and create encrypted tunnels, ensuring continuous remote access despite any defensive measures the victims may employ. These tactics reveal the group's commitment to maintaining a long-term presence within compromised environments, posing significant challenges to defenders.

Moreover, the activities of Crypt Ghouls illustrate potential collaboration or resource sharing with other threat actor groups that target Russian entities, such as MorLock, BlackJack, Twelve, and Shedding Zmiy. This overlap in tools and tactics complicates the identification and mitigation of their threats. Ultimately, their continual evolution and the possibility of alliances with other cybercriminal factions require cybersecurity professionals worldwide to stay vigilant and adaptive in their defense strategies.