Kaspersky puts spotlight on malicious ransomware group Luna
Kaspersky researchers have uncovered a new ransomware group that further underlines the trend of ransomware actors turning to cross-platform functionality.
The group, dubbed Luna, employs the use of ransomware written in Rust, a programming language that has been previously used by BlackCat and Hive gangs, among others. It allows them to port malware from one operating system to another.
This discovery, among others, is part of the recent crimeware report available on Securelist by Kaspersky.
Luna deploys malware written in Rust - its cross-platform capabilities allow the group to aim at Windows, Linux and ESXi systems all at once. The advertisement on the dark web, spotted by Kaspersky, states that Luna only works with Russian-speaking affiliates.
Moreover, the ransom note hardcoded into the binary contains some spelling mistakes - driving towards the conclusion that the group might be Russian-speaking.
Since Luna is a newly discovered group, there’s still little data on its victimology - but Kaspersky are actively following Luna's activity, according to a statement from the company.
Kaspersky states that Luna underlines the recent trend for cross-platform ransomware, with languages like Golang and Rust being heavily implemented by modern ransomware gangs in the past year.
A notable example includes BlackCat and Hive, the latter using both Go and Rust. These languages are platform independent, so the ransomware written using them can be easily ported from one platform to another.
The attacks can then be aimed at multiple operating systems at the same time. Another investigation recently conducted by Kaspersky provides deeper insight into ransomware actor Black Basta’s activity.
This group executes a new ransomware variant written in C++ which first came to light in February 2022. Since then, Black Basta has managed to attack more than 40 victims, mainly in the United States, Europe and Asia.
As Kaspersky’s investigation has shown, both Luna and Black Basta are targeting ESXi systems, as well as Windows and Linux, which is yet another ransomware trend of 2022. ESXi is a hypervisor that can be used independently on any operating system.
Since many enterprises have migrated to virtual machines based on ESXi, it has become easier for the attackers to encrypt the victims’ data.
Jornt van der Wiel, a security expert at Kaspersky, comments, “The trends we outlined earlier this year seem to be gaining steam. We see more and more gangs using cross-platform languages for writing their ransomware.
"This enables them to deploy their malware on a variety of operating systems. The increased attacks on ESXi virtual machines is alarming and we expect more and more ransomware families to deploy the same strategy."
To protect yourself and your business from ransomware attacks, consider following these rules proposed by Kaspersky:
- Do not expose remote desktop services (such as RDP) to public networks unless absolutely necessary and always use strong passwords for them.
- Focus your defence strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to the outgoing traffic to detect cybercriminals' connections.
- Use solutions which can help to identify and stop the attack in its early stages, before the attackers reach their final goals. Such solutions include endpoint detection and response, and managed detection and response.
- To protect the corporate environment, educate employees. Dedicated training courses can help.
- Use the latest Threat Intelligence information to stay aware of actual TTPs used by threat actors.