FortiGuard Labs is aware that the Cybersecurity and Infrastructure Security Agency (CISA) recently released an advisory on Royal ransomware as part of its #StopRansomware effort. The advisory states that Royal ransomware compromised multiple organizations globally starting late 2022. The threat actor is known to use malware and dual-use tools to establish persistence, move laterally in the compromised networks and exfiltrate data from victims and ultimately lock victim machines for monetary gain.Why is this Significant?This is significant because CISA released the advisory for Royal ransomware for public awareness purposes. Due to its worldwide campaign starting last September, Royal has been attributed to many attacks in recent months and is gaining traction and severity due to observed attacks targeting critical infrastructure, such as Manufacturing, Communications, Healthcare and Public Healthcare (HPH), and Education verticals.What is Royal ransomware?Royal is a relatively new ransomware, having been around since at least the start of 2022. The group initially used Windows versions of Royal ransomware; however a Royal ransomware variant that can infect ESXi was observed in 2023. The Royal ransomware objective is to compromise victims’ networks, exfiltrate information, deploy Royal ransomware for file encryption and ultimately extort money from the victims for file decryption and preventing data leaks.According to the advisory, Royal ransomware infection vectors include emails, malvertising campaigns, Remote Desktop Protocol (RDP) compromise, exploiting internet-facing applications and gaining access from initial access brokers.Tools used by Royal ransomware threat actor include Chisel for C2 communication, PsExec for lateral movement, AnyDesk, LogMeIn, and Atera, to establish persistence, and Cobalt Strike and Ursnif/Gozi malware to exfiltrate data.Typically, Royal ransomware adds a “.royal” file extension to encrypted files and leaves “README.txt” as a ransom note. FortiGuard Labs previously posted blogs on Royal ransomware. See the Appendix for a link to “Ransomware Roundup: Royal Ransomware” and “Royal Ransomware Targets Linux ESXi Servers”.What is the Status of Protection?FortiGuard Labs has the following AV signatures in place for the available samples called out in the advisory:W32/Chisel.A!trBAT/Agent.E949!trBAT/Agent.70c4!trPowerShell/Agent.FGA!trRiskware/NsudoW32/PossibleThreatFortiGuard Labs has the following AV signatures in place for known samples of Royal ransomware:W32/Ransom_Royal.FFBJFIM!trW32/Royal.D779!tr.ransomW32/Royal.47AC!tr.ransomW64/Royal.CF4E!tr.ransomLinux/Filecoder_Royal.A!trW32/PossibleThreatNetwork IOCs in the advisory are blocked by the FortiGuard Webfiltering client.
More Stories
chromium-129.0.6668.70-1.fc41
FEDORA-2024-8008ddbd4e Packages in this update: chromium-129.0.6668.70-1.fc41 Update description: Update to 129.0.6668.70 High CVE-2024-9120: Use after free in Dawn High CVE-2024-9121:...
USN-7040-1: ConfigObj vulnerability
It was discovered that ConfigObj contains regex that is susceptible to catastrophic backtracking. An attacker could possibly use this issue...
USN-7039-1: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
aws-24.0.0-3.fc41
FEDORA-2024-7908ee39a9 Packages in this update: aws-24.0.0-3.fc41 Update description: CVE-2024-41708: Ada Web Server did not use a cryptographically secure pseudorandom number...
USN-7021-3: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
aws-24.0.0-3.fc42
FEDORA-2024-b87003097a Packages in this update: aws-24.0.0-3.fc42 Update description: Automatic update for aws-24.0.0-3.fc42. Changelog * Thu Sep 26 2024 Björn Persson...