Ransomware on the Move: Akira, Cactus, Hunters International, RansomHub

Published on
August 13, 2024

Halcyon publishes a quarterly RaaS and data extortion group reference guide, Power Rankings: Ransomware Malicious Quartile. Here's the ransomware gangs on the move last week...

Ransomware attacks surged during the week of July 28 to August 4, 2024, with four notable groups—Akira, Cactus, Hunters International, and RansomHub—leading the charge once more. These groups targeted a broad spectrum of industries, exploiting weaknesses across sectors such as manufacturing, business services, retail, and healthcare services . Their varied tactics reflect the evolving landscape of cyber threats, where no organization is safe from attack.

Akira made significant moves by targeting Industrias Peñoles and Braspress, leading to severe data breaches. These attacks highlight Akira’s continued focus on high-value sectors like manufacturing and logistics, demonstrating the group's ability to disrupt critical operations and compromise sensitive information.  

Meanwhile, Cactus ransomware successfully infiltrated Dahl Valve Limited and Chubb Bulleid, further establishing its threat in both the manufacturing and legal industries.

Hunters International, with its ties to the now-defunct Hive group, focused on organizations like LRN Corporation and Khandelwal Laboratories. These attacks reveal a strategic approach, targeting sectors where the impact of a breach can be particularly devastating, such as healthcare and education.  

RansomHub, a newer player, executed significant breaches at Normandy Diesel and Bahia Principe Hotels & Resorts, showcasing the expanding threat to industries including automotive services and hospitality.

Akira

Akira is a ransomware family that first emerged in March 2023, rapidly becoming a prominent threat across multiple sectors. Operating as a Ransomware-as-a-Service (RaaS) platform, Akira enables affiliates to launch attacks, sharing the ransom proceeds—typically ranging from $200,000 to over $4 million. The group is believed to have ties to the now-defunct Conti ransomware gang, with notable similarities in their code.  

Akira’s ransomware is written in Golang, a programming language known for its cross-platform capabilities, allowing the group to target both Windows and Linux systems, including VMware ESXi virtual machines.  

Active in regions such as Europe, North America, and Australia, Akira primarily targets small to medium-sized businesses across sectors like manufacturing, technology, education, pharmaceuticals, and government.

Akira's attacks typically involve the exfiltration of large amounts of sensitive data, which is then used to extort victims by threatening to publish it unless a ransom is paid.  

For instance, Industrias Peñoles, a leading Mexican mining and metallurgical company, suffered a breach on July 30, 2024, where Akira infiltrated its systems and exfiltrated sensitive data, including financial records and proprietary business information. Despite this, Peñoles managed to maintain operational continuity by relying on backup systems.  

Another attack targeted Macadam Europe, a company specializing in vehicle inspections and fleet management. The Akira group exfiltrated 50 GB of sensitive data, including HR records, non-disclosure agreements, and customer databases, posing significant operational and reputational risks.

Significant Attacks Claimed by Akira

Cactus

Cactus is a ransomware group that first emerged in March 2023, quickly becoming a significant player in the ransomware landscape. Operating as a Ransomware-as-a-Service (RaaS), Cactus provides its affiliates with sophisticated tools to carry out attacks, often exploiting vulnerabilities such as the ZeroLogon flaw (CVE-2020-1472).  

The group's techniques include using custom scripts to disable security tools and deploy their ransomware, which is known for its unique encryption methods. Cactus targets organizations across various sectors, including manufacturing, legal services, and business services, focusing on those that manage critical and confidential data.

Cactus's attacks typically involve the exfiltration of substantial amounts of sensitive information, which the group then uses in double extortion schemes.  

For instance, Dahl Valve, a Canadian manufacturer of plumbing and heating valves, experienced a breach where 80GB of data, including personally identifiable information (PII), corporate documents, and financial records, was exfiltrated.  

These incidents underscore the significant operational and reputational risks posed by Cactus's tactics.

Significant Attacks Claimed by Cactus

  • Chubb Bulleid, a prominent law firm with an estimated revenue of $14 million, was targeted by the Cactus ransomware group, resulting in a major data breach disclosed on July 31, 2024. The attack led to the exposure of a wide array of sensitive and confidential information, including litigation files, corporate data, non-disclosure agreements, contracts, employee records, financial documents, and internal correspondence. The leak has potentially jeopardized confidential client information and critical business records, raising serious concerns about client confidentiality and the firm's operational integrity.

Hunters International

Hunters International is a ransomware group that emerged in the third quarter of 2023, rapidly gaining attention as a significant threat in the cyber landscape. This group operates as a Ransomware-as-a-Service (RaaS) platform, enabling affiliates to execute ransomware attacks by leveraging Hunters International's infrastructure and malware.  

The group's ransomware code shows a 60% overlap with that of the notorious Hive ransomware, indicating a possible evolution or rebranding from the now-disrupted Hive operation. Hunters International primarily focuses on data exfiltration, followed by extortion, demanding ransoms in exchange for the safe return of stolen data.  

Their operations have been detected across various regions, including the United States, the United Kingdom, Germany, and Namibia, targeting a diverse range of industries without a specific focus.

The attacks orchestrated by Hunters International typically involve the theft of substantial amounts of sensitive data, which is then used as leverage in their extortion tactics.  

For example, Khandelwal Laboratories Pvt. Ltd., a prominent Indian pharmaceutical company, fell victim to a breach where 126.5 GB of sensitive data, including proprietary formulations and patient information, was exfiltrated.  

Another significant case involved LRN Corporation, an American firm specializing in ethics and compliance training, which saw its data and systems compromised, leading to severe operational disruptions.  

These breaches highlight the substantial financial and reputational risks companies face when targeted by Hunters International, particularly when sensitive or proprietary information is involved.

Significant Attacks Claimed by Hunters International

RansomHub

RansomHub is a relatively new player in the ransomware landscape, having quickly established itself as a formidable threat since its emergence. Operating as a Ransomware-as-a-Service (RaaS) group, RansomHub follows a profit-sharing model where affiliates receive 90% of the ransom proceeds, leaving the remaining 10% to the core group.  

RansomHub's ransomware strains are notably written in Golang, a programming language that has been gaining popularity among cybercriminals due to its cross-platform capabilities. The group has shown no particular industry focus, instead targeting a wide array of sectors across various countries, including the United States, Brazil, Indonesia, and Vietnam.  

Healthcare institutions have been among their notable targets, with Change Healthcare being attacked by RansomHub after a previous hit by the ALPHV group.

The attacks carried out by RansomHub are characterized by large-scale data exfiltration, which the group uses to exert pressure on their victims through extortion. For instance, one of their significant breaches targeted Normandy Diesel, a specialized automotive company based in France. RansomHub successfully exfiltrated 280GB of sensitive data, including invoices, contracts, financial records, and private information.  

Normandy Diesel, despite being a small enterprise with an estimated annual revenue of $1.08 million, was thrust into a precarious position due to this breach, which threatened the company’s operations and client trust.

Another example is the attack on Bahia Principe Hotels & Resorts, a leading hospitality chain known for its all-inclusive vacation experiences across the Caribbean and Spain. In this breach, RansomHub exfiltrated approximately 1230GB of data, posing significant risks to both the company's operations and the privacy of its clientele.  

The stolen data likely includes sensitive customer information, booking details, and financial records, which could severely impact the reputation and operational continuity of Bahia Principe, a brand recognized for its luxury offerings and customer service.

Significant Attacks Claimed by RansomHub

 

Halcyon.ai is the leading anti-ransomware company that closes endpoint protection gaps and defeats ransomware through built-in bypass and evasion protection, key material capture, automated decryption, and data exfiltration prevention – talk to a Halcyon expert today to find out more. Halcyon also publishes a quarterly RaaS and extortion group reference guide, Power Rankings: Ransomware Malicious Quartile.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.