Industrial Spy ransomware detected by HarfangLab EDR

Industrial Spy ransomware detected by HarfangLab EDR

Executive summary

Industrial Spy threat actors have established a new Market Place mid-march 2022 where they publish stolen data from breached companies. The marketplace provides 3 tiers of data offerings:

  • a “Premium” tier where stolen data packages are sold millions of dollars and reserved to single buyers,
  • a “General” tier where data can be bought as individual files, after a 7-day period in the “Premium” tier,
  • a “Free” tier where data can be downloaded for free.

The marketplace is not only promoted throughout the Darknet and Telegram channels, but also through a malware (variant #1) that is dropped onto victim’s computer and generates multiple readme files across desktop folders and operating system, as well as changing the system background theme to Industrial Spy’s logo.

End of May 2022, the Industrial Spy threat actors started to use a ransomware (variant #2) in addition to stealing and publishing data. They start with direct secret interactions with their victims and a couple of days later, they publish the stolen data in their marketplace.

Early June, the Industrial Spy ransomware gang started to compromise their victim’s corporate website in order to publicly display ransom notifications.

The vast majority of Industrial Spy targets are mainly from the US and western Europe (80%) while few victims are from Asia and South America.

Tools, Techniques and Procedures

Malware variant #1 : advertising the Industrial Spy’s market place.

The malware, named “tools.exe” has been uploaded multiple times in VirusTotal and received a malicious score of 52/66. It is dropped from known malwares and stealers. The malware generates multiple README files with Industrial Spy generic advertisements as depicted in Figure 1.

Figure 1: README file generated by the malware variant #1

It also modifies the desktop background image as depicted in Figure 2.

Figure 2: Background modification by the malware variant #1

The advised marketplace is hosted on a Tor website with the following address: http://spyarea23ttlty6qav3ecmbclpqym3p32lksanoypvrqm6j5onstsjad[.]onion


The marketplace provides 3 tiers of data offerings:

  • a “Premium” tier where stolen data packages are sold millions of dollars and reserved to single buyers,
  • a “General” tier where data can be bought as individual files, after a 7-day period in the “Premium” tier,
  • a “Free” tier where data can be downloaded for free.

Figure 3: Advertisement of stolen data from an Indian victim in the Premium tier

For each victim, the detailed list of stolen files is accessible so that buyers can select the precise files they want to download (see Figure 4).

Figure 4: List of stolen files for a particular victim

Malware variant #2 : Ransomware

End of May 2022, the Industrial Spy threat actors started to use a ransomware (variant #2) in addition to stealing and publishing data.

The Industrial Spy ransomware encrypt files on the system but does not modify their file extensions. While it encrypts files, the ransomware creates a ransomware note in README.html files (see Figure 5) in every folder of the device.

Figure 5: Industrial Spy ransom note (README.html)

Relationships

The analysis of the Industrial Spy ransomware relationships show that the Cuba ransomware family (variant #3) can also be associated to the same Threat Actors.

Figure 6: Industrial Spy ransomware relationships

Course of Actions

  • Increase corporate website monitoring
  • Backup systems and isolate backups

IOCs

Variant #1 SHA256 hashes

  • c96b098cab47c0a33d0b6d8f14b24e7c9ba897b0c59a2ac1f3dc608ca7a2ed7e
  • 5ed4ffbd9a1a1acd44f4859c39a49639babe515434ca34bec603598b50211bab
  • 911153af684ef3460bdf568d18a4356b84efdb638e3e581609eb5cd5223f0010

Variant #1 import hash

  • 60c52a7e07d965a807e77f1315a9ffd3

Variant #1 IP connectivity check in ICMP

  • 1.1.1.1

Variant #2 SHA256 hashes

  • dfd6fa5eea999907c49f6be122fd9a078412eeb84f1696418903f2b369bec4e0

Variant #2 import hash

  • 2c83a3a81b083cf9ebbe4088faee6709

Variant #3 SHA256 hashes

  • 0c729cfb8f8717f66a59a7570523d92668efe6eed988b9fe68ac742e1851f8ca
  • 3f299c6f9ad8233bcb8df3301a143604c083341040b33ba197c6474bb2284824
  • 936119bc1811aeef01299a0150141787865a0dbe2667288f018ad24db5a7bc27
  • 482b160ee2e8d94fa6e4749f77e87da89c9658e7567459bc633d697430e3ad9a

Variant #3 import hash

  • 86af0b184f40d571fe17311cf5eb5dd7

HarfangLab EDR detection

The Industrial Spy ransomware is detected by the following detection engines and rules:

  • Behavioral engine: rule “Shadow Copies Deleted”
  • Behavioral engine: rule “Suspicious file created into Recycle Bin folder”
  • Ransomguard protection: rule “ransomware detection”

Figure 7: Process tree associated to the ransomware

Figure 8: HarfangLab EDR detection of Industrial Spy ransomware

About HarfangLab

HarfangLab is a cybersecurity software company, created in 2018 by former members of the Ministry of the Defense, major cybersecurity companies and the National Cybersecurity Agency of France (ANSSI), who have more than 25 years of experience in cyber defense.

HarfangLab was created to protect organizations' IT systems while preserving their digital integrity. To reach that goal, the company has developed a sovereign EDR (Endpoint Detection & Response) designed to protect the computers and servers of an IT system. Today, HarfangLab is the only EDR certified by the National Cybersecurity Agency of France (ANSSI).

References

Also to be seen :

Discover HarfangLab EDR from different angles

Ressources