RA Group attacks Bluelinea

Incident Date: Jul 29, 2023

Attack Overview
VICTIM
Bluelinea
INDUSTRY
Manufacturing
LOCATION
France
ATTACKER
Ra Group
FIRST REPORTED
July 29, 2023

The RA Group Ransomware Attack on Bluelinea

The RA Group ransomware gang has attacked Bluelinea. Bluelinea is a remote assistance device manufacturer headquartered in Versailles, France. RA Group posted Bluelinea to its data leak site on July 29th, leaking 3519MB of stolen data belonging to 216,914 customers. The data includes but is not limited to names, addresses, emails, physical conditions, and emergency contacts.

Identification and Tactics of RA Group

Researchers first identified the RA Group on April 22nd, 2023, when it launched its data leak site. RA Group uses an encryptor based on Babuk's (another ransomware gang) leaked source code. The group primarily targets US manufacturing, pharmaceutical, insurance, and wealth management firms. RA Group uses double extortion tactics.

Unique Characteristics of RA Group's Attacks

The distinctive trait of the RA Group involves crafting a unique ransom note tailored for the specific organization under attack, and the malware's executable file is also named after the victim. The ransomware targets all logical drives on the victim's computer and network shares, seeking to encrypt specific folders. Notably, directories linked to the Windows system, boot files, Program Files, and similar components are excluded from encryption. This strategy is employed to prevent rendering the victim's system completely unusable, thereby reducing the likelihood of receiving a ransom payment.

Encryption Methodology

The encryptor used by the RA Group employs intermittent encryption. This method alternates between encrypting and not encrypting segments of a file, which accelerates the encryption process. However, this approach carries risks as it permits partial data recovery from files. The encryptor utilizes curve25519 and eSTREAM cipher hc-128 algorithms. The files that undergo encryption have the ".GAGUP" extension added to their filenames. Furthermore, any volume shadow copies and contents in the Recycle Bin are purged to hinder data restoration.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.