Emerging Ransomware Targets Dozens of Businesses Worldwide

An rising ransomware strain in the threat landscape promises to have breached 30 companies in just 4 months considering the fact that it went operational, using on the coattails of a infamous ransomware syndicate.

Very first observed in February 2021, “Prometheus” is an offshoot of an additional properly-identified ransomware variant called Thanos, which was formerly deployed against point out-run organizations in the Middle East and North Africa final yr.

The influenced entities are thought to be governing administration, monetary services, production, logistics, consulting, agriculture, healthcare services, insurance businesses, energy and regulation firms in the U.S., U.K., and a dozen extra nations around the world in Asia, Europe, the Center East, and South The us, according to new research published by Palo Alto Networks’ Device 42 risk intelligence team.

Stack Overflow Teams

Like other ransomware gangs, Prometheus requires edge of double-extortion practices and hosts a darkish world-wide-web leak site, wherever it names and shames new victims and makes stolen facts available for order, at the exact time managing to inject a veneer of professionalism into its legal actions.

“Prometheus runs like a skilled organization,” Doel Santos, Unit 42 threat intelligence analyst, said. “It refers to its victims as ‘customers,’ communicates with them utilizing a shopper assistance ticketing system that warns them when payment deadlines are approaching and even uses a clock to depend down the hours, minutes and seconds to a payment deadline.”

Having said that, only four of these 30 affected corporations opted to spend ransoms to day, the cybersecurity firm’s examination exposed, such as a Peruvian agricultural firm, a Brazilian health care providers supplier, and two transportation and logistics corporations in Austria and Singapore.


It truly is worthy of noting that regardless of Prometheus’ solid links to Thanos, the gang professes to be a “group of REvil,” one of the most prolific and infamous ransomware-as-a-services (RaaS) cartels in latest years, which the scientists speculate could be an try to deflect interest from Thanos or a deliberate ploy to trick victims into spending up by piggybacking on an recognized operation.

When the ransomware’s intrusion route continues to be unclear as however, it truly is expected that the team purchased accessibility to target networks or staged spear-phishing and brute-pressure attacks to obtain initial accessibility. Next a prosperous compromise, the Prometheus modus operandi requires terminating backup and stability software package-relevant procedures on the procedure to lock the data files powering encryption barriers.

Enterprise Password Management

“The Prometheus ransomware operators crank out a exceptional payload per target, which is employed for their negotiation web site to recover information,” Santos claimed, introducing the ransom need ranges wherever concerning $6,000 and $100,000 relying on the target firm, a cost that gets doubled if the target fails to shell out up within the designated time period.

Exploit code

The progress also comes as cybercrime teams are ever more targeting SonicWall units to breach company networks and deploy ransomware. A report published by CrowdStrike this week located evidence of distant obtain vulnerabilities (CVE-2019-7481) in SonicWall SRA 4600 VPN appliances staying exploited as an original accessibility vector for ransomware assaults concentrating on corporations worldwide.

Fibo Quantum