Introduction

Since its discovery in June 2024, the Cicada3301 ransomware-as-a-service (RaaS) group has been observed targeting businesses across a wide range of critical sectors. Between June and October 2024, the group published stolen data from 30 companies on their dedicated leak sites (DLS), with 24 instances of attacks that claimed victims based in the United States and the United Kingdom.

Group-IB has recently and successfully gained access to the Cicada3301 ransomware affiliate panel. In this blog, we share its inner workings based on our thorough analysis of the available ransomware versions offered within the affiliate panel, and all accessible sections to provide a definitive assessment of this threat.

Researcher’s Note: The ‘original’ Cicada 3301 emerged in 2012 as an enigmatic cryptographic puzzle group, challenging individuals worldwide with complex ciphers, hidden clues in both digital and physical spaces, and references to esoteric literature, philosophy, and art, creating an aura of intellectual intrigue and deep mystery. The group’s motives and true identity remain shrouded in speculation, with theories ranging from a secret society to a covert recruitment tool for intelligence agencies.

Key Discoveries in this Blog

  • Emergence of Cicada3301 Ransomware Group: Since its discovery in June 2024, Cicada3301 has rapidly targeted 30 organizations across critical sectors within three months, with a significant focus on the USA and the UK.
  • Advanced Multi-Platform Ransomware: The ransomware is written in Rust, supporting Windows, Linux, ESXi, and NAS platforms, even extending to uncommon architectures like PowerPC.
  • Sophisticated Affiliate Program: Cicada3301 runs an affiliate program recruiting penetration testers (pentesters) and access brokers, offering a 20% commission, and providing a web-based panel with extensive features for affiliates.
  • Complex Encryption Techniques: Utilizes ChaCha20 and RSA encryption with configurable modes (Full, Fast, Auto), capable of both full and partial file encryption to optimize the speed and impact of the attacks.
  • Aggressive Tactics for Maximum Impact: Features include shutting down virtual machines on ESXi and Hyper-V, terminating processes and services, deleting shadow copies, and encrypting network shares to maximize disruption.

Who may find this blog interesting:

  • Cybersecurity analysts and corporate security teams
  • Malware analysts
  • Threat intelligence specialists
  • Cyber investigators
  • Computer Emergency Response Teams (CERT)
  • Law enforcement investigators
  • Cyber police forces

Threat Actor Profile

Threat Actor Profile

Number of Attacks by Industry

Onion domain of dedicated leak site (DLS) of Cicada3301 ransomware:
hxxp[:]//cicadabv7vicyvgz5khl7v2x5yygcgow7ryy6yppwmxii4eoobdaztqd[.]onion/

Figure 1. Screenshot of a dedicated leak site (DLS) of Cicada3301 ransomware.

Figure 1. Screenshot of a dedicated leak site (DLS) of Cicada3301 ransomware.

Infiltrating the Cicada3301 Ransomware Group

On  29-June 2024, a user named “Cicada3301” started an affiliate program of the Cicada3301 ransomware as a topic on the popular underground dark web forum “RAMP”.

Figure 2. Screenshot of the user profile ‘Cicada3301’ on the RAMP forum.

Figure 2. Screenshot of the user profile ‘Cicada3301’ on the RAMP forum.

Affiliate Program Recruitment:

The topic starts by stating that Cicada3301 is seeking pentesters and access advertisers, and a “mini-interview” is required as a prerequisite for participation in the affiliate program.  Interestingly, it also strictly prohibits its affiliates from conducting any operations in the countries of the Commonwealth of Independent States (CIS), and that panel access must not be shared with third parties without support approval. The topic also states that the affiliates will receive a 20% cut of the total payout from its victims, which would be paid-out via wallets in the chat. In instances where the payouts exceed US$1.5-million, two wallets would be used—one for the affiliate, and another for the program.

LOCKER Details:

The locker is developed in Rust, and utilizes ChaCha20 and RSA encryption, offering multiple modes including Full, Fast (15 blocks of 1 MB), and Auto. It operates offline and is compatible with Windows (from version 7), Linux, ESXi, and NAS systems. The locker supports multithreading and network mode, featuring targeted encryption, process termination, and system cleanup prior to encryption. It leaves instructions in each encrypted folder and excludes system-critical files and directories, while also supporting ESXi/Hyper-V VM stoppage. A decryption key is required to initiate the decryption process.

WEB Interface:

The web interface is only accessible via Tor, and provides services including chat, support, and sub-affiliate accounts. The interface also features a locker builder and landing page generator, as well as customizable ransom notes and file storage for data leaks.  Notably, private keys are not stored on servers. Cybercriminals remain wary after a significant incident involving the LockBit ransomware group, in which their private keys were leaked following Europol’s
Operation Cronos”, disrupting their affiliates’ ransom deals,  and allowing their victims to obtain decryptors for free. As a result, RaaS owners now claim that they do not handle private decryption keys on their server, although this claim by the owners could not be verified.

Figure 3. Screenshots of a post by Cicada3301 promoting its ransomware-as-a-service on the RAMP forum.

Figure 3. Screenshots of a post by Cicada3301 promoting its ransomware-as-a-service on the RAMP forum.

The following is a translation of the topic posted by Cicada3301, from Russian to English:

Welcome to Cicada3301!
We are recruiting partners for our affiliate program:
– Pentesters.
– Access advertisers.
General Information:
– Operations in CIS countries are strictly prohibited.
– Affiliate program commission is 20% of the total payout.
– Participation requires a mini-interview.
– Payout wallet is provided in the chat; for amounts over $1.5 million USD, two wallets are provided: one for you and one for us.
– It is strictly forbidden to share panel access with third parties unless approved by support.
LOCKER:
– Developed from scratch in Rust.
– Uses ChaCha20 + RSA for file encryption, supporting both full and partial file encryption.
Encryption Modes:
Full: Full file encryption.
Fast: Fast encryption of 15 blocks of 1 MB.
Auto: Automatic selection of optimal encryption parameters.
– Configurable encryption parameters at locker build.
– Works offline, no internet connection required.
– Compatible with all versions of Windows from Windows 7, as well as Linux, ESXi, and NAS.
– Supports multithreading and network mode for parallel local network scanning.
– Features targeted encryption for files, folders, and partitions.
– Supports impersonation to run under different credentials.
– Terminates specified processes and stops/deletes specified services before encryption.
– Mounts hidden drives before encryption.
– Cleans recycle bin, deletes shadow copies, and removes system restore points before encryption.
– Leaves a text note with instructions in each encrypted folder.
– Has an exclusion list for system file extensions and directories that should not be encrypted.
– Stops VM ESXi/Hyper-V operations.
– Note is stored encrypted; locker can only be started with a decryption key.
– Supports delayed locker start via timer, suitable for “mining” the network.
– Supported architectures:
Windows-x86_x64, Linux64, Linux32, LinuxARM64, LinuxARM,​
LinuxARMv5te, LinuxARMv7, PowerPC, PowerPC64, PowerPC64le​
– Successfully tested on the following systems:
ESXI 5.5.0, 6.7.0, 7.0.1, 7.0.3, 8.0.0​
Ubuntu 22.04 x64, 20.04 x64​
Debian 11 x64, 10 x64​
CentOS 9 Stream x64, 8 Stream x64, 7 x64, 7 SELinux x64​
Rocky Linux x64, Almalinux-9.0-x86_64, Webuzo-almalinux-8.6-x86_64​
Scientific-7.4-x86_64​
Suse-15.1-x86_64​
Fedora-34-x86_64​
Oracle-8.6-x86_64, 8.8-x86_64, 9.2-x86_64​
WEB:
– Entire web resource accessible via Tor.
– Chat companies: Communication can be handled by us or by you, as specified when creating the company.
– Chat support: Communication with support.
– SubAffiliate: Account for your partners with read-only chat access.
– Builder: Locker build according to your configurations.
– Landing: Key generation providing private chat access.
– Option to set up a landing page indicating only data leaks (without encryption).
– Private keys from companies are not stored on our servers.
– Option to edit the note.
– Company call handling.
– File storage for data leaks.
Deposit: https://xss.is/members/376495
Blog: http://cicadabv7vicyvgz5khl7v2x5yygcgow7ryy6yppwmxii4eoobdaztqd.onion
Awaiting your TOX in forum PM.

Group-IB Threat Intelligence analysts infiltrated the Cicada3301 Ransomware group and contacted the user “Cicada3301” via Tox, an instant messaging protocol, and through our private conversations received access to the affiliate program of the Cicada3301 ransomware.

Figure 4. Screenshot of the authentication page of Cicada3301 ransomware group.

Figure 4. Screenshot of the authentication page of Cicada3301 ransomware group.

Within the dashboard of the Affiliates’ panel of Cicada3301 ransomware group contained sections such as Dashboard, News, Companies, Chat Companies, Chat Support, Account, an FAQ section, and Log Out.

Dashboard

The “Dashboard” section provides an overview of the successful or failed logins by the affiliate, fingerprint details, and a chart depicting the number of companies attacked by the affiliate.

Figure 5. Screenshot of the section “Dashboard” of Cicada3301 ransomware panel.

Figure 5. Screenshot of the section “Dashboard” of Cicada3301 ransomware panel.

News

The section “News” contains information about updates and news of the Cicada3301 ransomware program. During the review of the “News” section within the affiliate panel, we identified the following updates in the operations of the Cicada3301 Ransomware RaaS group:

Date

Update

4 May 2024 Announced plans to implement new features:

  • Worm Mode for Windows systems
  • Own File Storage for storing leaked data
  • Creation of a Call Center for contacting victim organizations
13 June 2024 Released a series of updates and optimizations:

  • Fixed bugs in the locker and web interface
  • Reduced the size of web resources to enhance panel loading speed
  • Added additional verification step for Unix locker post encryption
  • Improved encryption algorithm to speed up the process
  • Implemented the `no_notes` parameter in Windows to suppress ransom notes
  • Added the ability to disable HyperV virtual machines in Windows
  • Enabled parallel disk encryption for Windows
  • Reduced locker size by 50%
15 June 2024 Introduced their own file server and invited affiliates to start uploading exfiltrated data
18 June 2024 Completed the setup of the call center and invited affiliates to provide contact numbers, victim names, and ransom texts for calls
Figure 6. Screenshot of a post in the “News” section of Cicada3301 ransomware panel, dated 4 May 2024.

Figure 6. Screenshot of a post in the “News” section of Cicada3301 ransomware panel, dated 4 May 2024.

The following is a translation of the post above (Figure 6), from Russian to English:

Start
Welcome to Cicada3301!
We are pleased to welcome you as our partner. At the moment, our tool provides extensive functionality, and we are constantly improving and improving it. Updates are planned in the near future that will expand the functionality of our software.
Plans for the near future include:
– Worm mode for Windows.
– Own file storage for storing leaked data.
– Creation of a call center for calls in the company.
If you have any questions or need help, don’t hesitate to contact us. We are always ready to help you achieve success!
Sincerely,
Team Cicada3301!

Figure 7. Screenshot of “Update #1” in “the News” section of the Cicada3301 ransomware panel, dated 13 June 2024.

Figure 7. Screenshot of “Update #1” in “the News” section of the Cicada3301 ransomware panel, dated 13 June 2024.

The following is a translation of the post above (Figure 7), from Russian to English:

Update #1
– Fixed bugs in the locker and the web interface.
– The size of web resources has been reduced, making the panel load faster.
– After completing system encryption, the Unix locker performs an additional check of its operation.
– Improved encryption, which significantly speeded up the process.
– In Windows, a function has been added not to leave a note with the –no_notes parameter.
– Added disabling Hyper-V virtual machines to Windows.
– Windows implements parallel disk encryption.
– The size of the locker is reduced by 2 times.

Figure 8. Screenshot of “Update #2” in the “News” section of Cicada3301 ransomware panel, dated 15 June 2024.

Figure 8. Screenshot of “Update #2” in the “News” section of Cicada3301 ransomware panel, dated 15 June 2024.

The following is a translation of the post above (Figure 8), from Russian to English:

Update #2
Dear partners,
We are pleased to announce that we now have our own file server. Contact support to upload and publish data leaks.
Sincerely,
Team Cicada3301!

Figure 9. Screenshot of “Update #3” in the “News” section of the Cicada3301 ransomware panel, dated 18 June 2024.

Figure 9. Screenshot of “Update #3” in the “News” section of the Cicada3301 ransomware panel, dated 18 June 2024.

The following is a translation of the post above (Figure 9), from Russian to English:

Update #3
Dear partners,
We are pleased to announce that we have the opportunity to make calls.
We ask you to send a list of numbers and the text of the message to the support service. If possible, include the names of the callers.
Sincerely,
Team Cicada3301!

Companies

Within the “Companies” section, affiliates can add their victims, build samples of Cicada3301 ransomware, and configure these samples.

Figure 10. Screenshot of the “Companies” section of Cicada3301 ransomware panel.

Figure 10. Screenshot of the “Companies” section of Cicada3301 ransomware panel.

Using the “Create company” function, affiliates can configure the name of the company (victim), the full price (amount) of the ransom demanded, as well as a discounted price of the ransom and the discount expiration date (in hours).

Figure 11. Screenshot of the “Create company” panel within the “Companies” section of the Cicada3301 ransomware panel.

Figure 11. Screenshot of the “Create company” panel within the “Companies” section of the Cicada3301 ransomware panel.

Once the affiliates create entries of the companies they attacked, they will be able to see their victims on the “Companies” section, and configure ransomware samples for specific victims.

Figure 12. Screenshot of the “Companies” section after an entry of a victim is created.

Figure 12. Screenshot of the “Companies” section after an entry of a victim is created.

In addition to the fields that were previously highlighted in Figure 12, affiliates can make further changes via the “Configure” panel such as the type of encryption (Fast/Full/Auto), the type of landing page (Encrypted Data + Data Leak or Data leak only), credentials (Impersonation) for Windows-based platforms, virtual machine exclusions for ESXi/Hyper-V, as well as the text of the ransom note.

Chat Companies

Within the “Chat Companies” section, affiliates are greeted with an interface where they can select and search for the necessary chats with victims via the negotiation page, and communicate with them regarding the ransom during negotiations.

Figure 14. Screenshot of the “Chat Companies” section of the Cicada3301 ransomware panel.

Figure 14. Screenshot of the “Chat Companies” section of the Cicada3301 ransomware panel.

Chat Support

The “Chat Support” section contains an interface where you can communicate with representatives of the Cicada3301 ransomware group to resolve various issues. As mentioned in the “News” section, affiliates can use this interface to request for a phone call service to contact their victims.

Figure 15. Screenshot of the “Chat Support” section of the Cicada3301 ransomware panel.

Figure 15. Screenshot of the “Chat Support” section of the Cicada3301 ransomware panel.

Account

The “Account” section allows affiliates to reset and change their password for the affiliate panel.

Figure 16. Screenshot of the “Account” section of the Cicada3301 ransomware panel.

Figure 16. Screenshot of the “Account” section of the Cicada3301 ransomware panel.

FAQ

As for the “FAQ” section, the administrators of the Cicada3301 ransomware group provide rules and guides on creating victims in the “Companies” section, working with the builder, and executing samples of Cicada3301 ransomware on various operating systems.

The following is a translation of the “General Information” content within the “FAQ” section, from Russian to English:

General Information
1. Work in the CIS countries is strictly prohibited.
2. The affiliate program commission is 20% of the total payment amount.
3. Companies that are inactive for more than 60 days are removed by support.
4. If your account is inactive for more than 30 days, it is automatically blocked.
5. To get a subaccount for partners, you need to contact support.
6. The wallet for payments is provided in the chat. For amounts over 1.5 million USD, two wallets are provided: yours and ours.
7. Be sure to make a file listing that confirms the fact
data leaks. The absence of such a listing reduces the likelihood of success.
8. If you find bugs in the software or panel, be sure to report it to support.
9. It is strictly prohibited to transfer access to the panel to third parties, with the exception of agreement with support.
10. After gaining access to the panel, be sure to change the password.
11. Regularly monitor authorization statistics, pay attention to Fingerpriting and the number of sessions.

The following is a translation of the “Locker” content within the “FAQ” section, from Russian to English:

Description
1. The locker is written in Rust.
2. To encrypt files, the ChaCha20 method is used, which supports both full file encryption and encryption of only some of its parts. Encryption parameters can be configured individually when building the program.
3. The program works offline, without requiring an Internet connection.
4. The locker works on all versions of Windows, starting with Windows 7, as well as on Linux, ESXi and NAS.
5. File encryption occurs in multi-threaded mode.
6. The locker supports network operating mode, which allows parallel scanning of the local network.
7. It is possible to provide point-to-point encryption of files, folders and partitions.
8. The locker supports impersonation, which allows you to run the program under different credentials.
9. Before starting work, the locker terminates the specified processes, stops and deletes the specified services.
10. Before encryption occurs, the locker mounts the hidden drives.
11. Before encryption, the recycle bin is emptied, shadow copies and operating system restore points are deleted.
12. A text note with instructions is left in each folder where files have been encrypted.
13. The locker has a list of exceptions for system extensions of files and directories that do not need to be encrypted.
14. Supported architectures:
Windows-x86_x64, Linux64, Linux32, LinuxARM64, LinuxARM,
LinuxARMv5te, LinuxARMv7, PowerPC, PowerPC64, PowerPC64le
15. The locker has been successfully tested on the following systems:
ESXI 5.5.0, 6.7.0, 7.0.1, 7.0.3, 8.0.0
Ubuntu 22.04 x64, 20.04 x64
Debian 11 x64, 10 x64
CentOS 9 Stream x64, 8 Stream x64, 7 x64, 7 SELinux x64
Rocky Linux x64, Almalinux-9.0-x86_64, Webuzo-almalinux-8.6-x86_64
Scientific-7.4-x86_64
Suse-15.1-x86_64
Fedora-34-x86_64
Oracle-8.6-x86_64, 8.8-x86_64, 9.2-x86_64

The following is a translation of the content on how to create and configure victims in the “Companies” within the “FAQ” section, from Russian to English:

Creating and setting up a company
1. Company creation:
– Click on the “Create company” button.
– Fill in all the required fields in the window that appears.
2. Publication of information:
– After creating a company, go to the “Publication” section.
– Fill in the text fields according to your requirements.
– Add a company logo and screenshots confirming a hack or data leak.
– The following options are available in the “Public Blog” section:
Publish to Blog: The data is published to the blog.
Hide Data: Hide data on the blog.
Show Data: Show data in the blog.
– If you have already published data and made changes, use the “Publish to Blog” button to republish.
3. Configure:
– Encryption Type:
Full: Full file encryption.
Fast: fast file encryption in 1 MB blocks.
Auto: automatic selection of encryption parameters, optimal for files of different sizes and extensions (Recommended).
– Landing Type:
Encrypted data + Data Leak: used if the data is encrypted and downloaded.
Data Leak: used if the data has just been downloaded.
– Credentials [Impersonation] – Windows:
Example
Domain.local\Administrator : P@ssw0rd1
Localhost\Administrator : P@ssw0rd2
Domain.local\svc-admin : P@ssw0rd3
Domain.local\svc-one : P@ssw0rd4
Please note the separation format: the login and password are separated by two spaces before and at the end of the colon.
– Virtual Machine Exclusions – VMware ESXi (Virtual Machine Exclusions):
Example
DC01, DC02, DC03
– Note (Note for the company):
The text of the note that will be distributed during encryption.
– Build:
Compilation may take 15-20 minutes. Before you begin, make sure that all settings are saved using the “Save” button.

The following is a translation of the content on how to execute the Cicada3301 ransomware samples within the “FAQ” section, from Russian to English:

Working with a locker
1. Linux/ESXi/NAS
We give permissions to the locker to execute
chmod +x Locker
Launching the locker
./Locker –key [KEYS]
Usage information:
–key Sets the keys for activation (Required parameter)
-p, –path Sets the path to the file or directory to be encrypted
-s, –sleep Sleep is indicated in seconds
–ui Set graphical user interface
–no_vm_ss Do not stop the vm and delete snapshots (ESXI)
For ESXi use the Linux64 build, for version 5 use ESXIv5
For ESXi 8, you need to disable the security system before starting the locker
esxcli system settings advanced set -o /User/execInstalledOnly -i 0
esxcli system settings kernel set -s=execinstalledonly -v false
2.Windows
Open cmd/powershell as administrator and run locker
Locker.exe –key [KEYS]
Usage information:
–key Sets the keys for activation (Required parameter)
-p, –path Sets the path to the file or directory to be encrypted
-s, –sleep Sleep is indicated in seconds
–no_local Skip encrypting data stored locally on this device
–no_net Skip encryption of network data
–no_impl Don’t use impersonation
Please note that the –key argument must be specified with the correct key, otherwise the locker will not start. The key can be found in the build archive in the README.txt file.

Technical Information

The Cicada3301 ransomware is written in Rust which supports architectures such as x86, ARM and PowerPC, and can be easily compiled for Windows, macOS, and Linux.

Ransomware developers favor Rust for its ability to compile across platforms, making it easier to target various operating systems. Its high performance and efficiency enable quick execution of malicious operations. Additionally, robust support for concurrent programming allows multiple tasks to run simultaneously, enhancing overall effectiveness. Cicada3301 are not the only ones who prefer Rust – Hive, RansomExx, ALPHV, Qilin (Agenda), and Luna have also been observed adopting this programming language.

Interestingly, the Cicada3301 ransomware shares very strong similarities with the retired and infamous ransomware, BlackCat. The only key differences between Cicada3301 and BlackCat are:

  • Only 6 command line options, considerably lesser when compared to BlackCat.
  • Initial activation key must be correct else the encryptor won’t start. This key is used to decrypt the ransom message.
  • No embedded configuration.
  • The Ransom note has the naming convention of RECOVER-[encrypted_extension]-DATA.txt, whereas Blackcat’s note uses the convention RECOVER-[encrypted_extension]-FILES.txt.

Ransom Note

In contrast, where the access key is used to decrypt BlackCat’s configuration, the key entered on the command line in Cicada3301 is used to decrypt the ransom note. After decryption, it will check if the decrypted content starts with `***ok***`. The ransom note is dropped in each directory with filename “RECOVER-[encrypted_extension]-DATA.txt”.

Figure 18: A screenshot of a Cicada3301 Ransom note

Figure 18: A screenshot of a Cicada3301 Ransom note

Encryption Scheme

The Cicada3301 ransomware utilizes a thread pool consisting of 50 threads to efficiently encrypt files. By employing multiple threads, it can simultaneously process numerous files, significantly speeding up the encryption process. It enumerates drives from A:\ to Z:\ and proceeds to encrypt files found in valid drives, excluding the whitelisted paths and extensions found in Annex A.

The encryption process is straightforward. It randomly generates a 32-byte Chacha key and 12-byte nonce to encrypt the file. These values are then encrypted using a hard-coded RSA public key, and the result is appended to the file.

From the guide, the encryption can be configured using Full, Fast or Auto during the build. The sample that we obtained during our investigation is configured for Auto, which automatically selects the encryption parameters, and is optimized for files of different sizes and extensions. Files can be categorized into three categories:

  • Files that are less than 100MB will be fully encrypted.
  • For files greater than 100MB, the ransomware encrypts files in chunks, processing every 1 MB for a total of 30 blocks. This means it will first encrypt 1MB and skip N bytes (filesize / 30) and so on.
  • For files that are greater than 100MB and have the following extensions, only the first 200MB is encrypted. At this point in our investigation, we are not sure if it was meant to be this way or this could be a bug, and can only confirm this for the sample that we have.

sql, doc, rtf, xls, jpg, jpeg, png, gif, webp, tiff, psd, raw, bmp, pdf ,docx, docm, dotx, dotm, odt, xlsx, xlsm, xltx, xltm, xlsb, xlam, ods, pptx, pptm, ptox, potm, ppsx, ppsm, odt, odp, mdf, txt

Environment Preparation

Inhibit System Recovery

The Cicada3301 ransomware runs the following commands to disable the automatic launch of Windows Recovery Environment after a failed boot, delete shadow copies, and clear Windows Event Logs.

bcdedit /set {default}
bcdedit /set {default} recoveryenabled No

vssadmin.exe Delete Shadows /all /quiet
wmic.exe Shadowcopy Delete

for /F 'tokens=*' %1 in ('wevtutil.exe el') DO wevtutil.exe cl %1

Kill processes and terminate services

It uses the below 3 commands to terminate processes and services. The list of terminated items can be found in Annex B.

C:\Windows\System32\taskkill.exe /IM [processname]* /F

for /F "tokens=2 delims=:" %i in ('sc query state^= all ^| findstr /I [servicename]') do sc stop %i

net stop [servicename] /y

Others

// Discover and stop local Virtual Machines
powershell -Command "Get-VM | Where-Object { $_.Name -notin @() } | ForEach-Object { Stop-VM -Name $_.Name -Force -Confirm:$false }"

// Follows symbolic links
fsutil behavior set SymlinkEvaluation R2L:1
fsutil behavior set SymlinkEvaluation R2R:1

// Increase the number of outstanding network requests allowed
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services \LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f

// Stop the Internet Information service (IIS)
iisreset.exe /stop

PSExec

PsExec binary is embedded inside the Cicada3301 ransomware itself. When the locker runs without the “no_impl” option, it copies itself to C:\Users\Public, drops a PsExec binary at C:\Users\Public\psexec0.exe and a batch file at C:\Users\Public\[rand_10chars].bat. It then launches the batch file which will then re-execute the locker.

Contents of C:\Users\Public\[rand_10chars].bat:

C:\Users\Public\psexec0.exe -accepteula -s -d [locker filepath] --no_impl --key [key]
del /Q "C:\Users\Public\[rand_10chars].bat"

PsExec is a command-line tool that allows users to run programs on remote systems. While the sample that we obtained does not contain embedded credentials, we presume that if credentials were used during the building process, the PsExec will be executed with credentials.

Linux and ESXi variant

There are two notable and additional differences between the Linux and Windows variants:

 

--ui           Set graphical user interface
--no_vm_ss     Do not stop the vm and delete snapshots (ESXI)

When executed with the –ui option, logs akin to the below will be printed.

Figure 19: Console logs with –ui option.

Figure 19: Console logs with –ui option.

For Linux variants, it avoids encrypting files that reside within these directories, or have the following extensions:

// whitelisted directories
/etc, /run, /usr, /sys, /dev, /bin, /lib, /boot, /snap, /proc, /sbin, /lib64, /cdrom

// whitelisted extensions
lock, tmp

For ESXi variants, the Cicada3301 ransomware will first shutdown the running virtual machines, before encryption starts with the following 2 commands used simultaneously. It terminates all the virtual machines and then deletes all snapshots. Cicada3301 does this via this single line command detailed below. However, one can choose not to shutdown the virtual machines via the “no_vm_ss” option.

esxcli --formatter=csv --format-param=fields=="WorldID,DisplayName" vm process list | grep -viE ",()," | awk -F "\"*,\"*" '{system("esxcli vm process kill --type=force --world-id="$1)}' > /dev/null 2>&1;

for i in `vim-cmd vmsvc/getallvms| awk \'{print$1}\’`;do vim-cmd vmsvc/snapshot.removeall $i & done > /dev/null 2>&1

PowerPC

The Cicada3301 ransomware also supports the PowerPC architecture. PowerPC is a type of microprocessor architecture that was developed by the AIM—an alliance between Apple, IBM, and Motorola in the early 1990s. It was designed to be a high-performance, Reduced Instruction Set Computing (RISC) architecture. PowerPC processors are not commonly found in recent mainstream personal computers, but they are still used in older Macs or specific legacy systems.

Conclusion

The Cicada3301 ransomware group has rapidly established itself as a significant threat in the ransomware landscape, due to its sophisticated operations and advanced tooling. The group’s ransomware, written in Rust, supports a wide range of platforms, including Windows, Linux, ESXi, NAS, and even uncommon architectures like PowerPC. By leveraging ChaCha20 + RSA encryption and offering a customizable affiliate panel, Cicada3301 enables its affiliates to execute highly targeted attacks. Their approach of exfiltrating data before encryption adds an additional layer of pressure on victims, while the ability to halt virtual machines increases the impact of their attacks.

Their operations are marked by aggressive tactics designed to maximize impact, such as terminating essential services, shutting down virtual machines, and encrypting data across various platforms and network shares. The use of a sophisticated affiliate program amplifies their reach, enabling skilled cybercriminals to customize attacks and manage victims efficiently through a feature-rich web interface.

The emergence of Cicada3301 underscores the evolving threats organizations face from ransomware groups that are increasingly professional, resourceful, and bold. It highlights the urgent need for organizations to bolster their cybersecurity measures, engage in proactive threat intelligence, and adopt a multi-layered defense strategy to protect against such advanced adversaries.

Recommendations

Although ransomware groups have gained notoriety for targeting companies in critical sectors, they are a threat to organizations across all industries and companies large and small. In addition to having new members in its cybercriminal network, ransomware affiliate programs equip members with upgraded tools and techniques. That being said, it is essential that businesses take specific steps immediately to keep their mission-critical operations and data secure. We recommend the following:

  • Add more layers of security: Multi-factor authentication (MFA) and credential-based access solutions help businesses secure their critical assets and high-risk users, making it harder for attackers to be successful.
  • Stop ransomware with early detection: Leverage the behavioral detection capabilities of the Endpoint Detection and Response (EDR) solution to help identify ransomware indicators across your managed endpoints, promptly alerting your teams to any suspicious activity for further scrutiny. This proactive approach enables agile detection, investigation and remediation of both known and unknown threats on your endpoints.
  • Have a backup strategy: Data backup processes should be conducted regularly as they reduce damage and help organizations avoid data loss following ransomware attacks.
  • Leverage an advanced malware detonation solution: Organizations should leverage AI-infused, advanced analytics-based solutions to detect intrusions in real time. Learn how Group-IB’s Managed XDR coupled with Threat Intelligence helps businesses to:
    • gain insights into the unique Tactics, Techniques, and Procedures (TTPs) used by Advanced Persistent Threats (APTs) and other cybercriminal groups and pivot their security strategies accordingly; and
    • enable multi-layered cybersecurity (endpoint, email, web, and network) through automated threat detection and response.
  • Patch it up: The longer a vulnerability remains unpatched, the greater the risk that it will be exploited by cybercriminals. Security patches should therefore be prioritized, and organizations should also set up a process to regularly review and apply patches as they become available.
  • Train your employees: The human factor remains one of the greatest vulnerabilities in cybersecurity. Educate employees about the risks relating to the organization’s network, assets, devices, and infrastructure. Organizations should conduct training programs and security drills to help employees identify and report the tell-tale signs of cybercrime (e.g. phishing emails).
  • Control vulnerabilities: Do not turn a blind eye to emerging vulnerabilities. Checking your infrastructure annually with a technical audit or security assessment is not only a good habit, it also adds a much-needed layer of protection. Infrastructural integrity and digital hygiene processes should be monitored continually.
  • For businesses seeking to enhance their cybersecurity stance and boost resilience against ransomware attacks, we strongly recommend reviewing our Ransomware Readiness whitepaper.

MITRE ATT&CK

T1059.001 Command and Scripting Interpreter: PowerShell Use of PowerShell for executing malicious commands and scripts to control infected systems.
T1070.004 Indicator Removal on Host: File Deletion Deleting logs or files to erase evidence of compromise and hinder forensic analysis.
T1046 Network Service Scanning Scanning internal and external networks to identify services, systems, and shares for exploitation.
T1016 System Network Configuration Discovery Gathering details about network configurations, such as IP addresses, routing tables, and ARP tables.
T1570 Lateral Tool Transfer Using tools such as PsExec to move files or execute code on remote machines for lateral movement.
T1486 Data Encrypted for Impact Encrypting files on a victim’s system to disrupt availability and demand ransom for decryption.
T1490 Inhibit System Recovery Deleting system restore points, shadow copies, or backups to prevent recovery after the attack.
T1489 Service Stop Stopping critical services, including security, backup, and virtualization services, to disrupt normal system functions.

Public Available Indicators of Compromise (IOCs)

Filename

SHA256

C:\Users\Public\psexec0.exe 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
csrss.exe 7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e
veeam.exe 3969e1a88a063155a6f61b0ca1ac33114c1a39151f3c7dd019084abd30553eab
system32.exe 56e1d092c07322d9dad7d85d773953573cc3294b9e428b3bbbaf935ca4d2f7e7

Network Indicators

hxxp[:]//cicadabv7vicyvgz5khl7v2x5yygcgow7ryy6yppwmxii4eoobdaztqd[.]onion/

Annex A

Terminated Processes

agntsvc, dbeng50, dbsnmp, encsvc, excel, firefox, infopath, isqlplussvc, msaccess, mspub, mydesktopq, mydesktopservic, notepad, ocautoupds, ocomm, ocssd, onenote, oracle, outlook, powerpnt, sqbcoreservic, sql, steam, synctime, tbirdconfig, thebat, thunderbird, visio, winword, wordpad, xfssvccon, *sql*, bedbh, vxmon, benetns, bengien, pvlsvr, beserver, raw_agent_svc, vsnapvss, CagService, QBIDPService, QBDBMgrN, QBCFMonitorSe, SAP, TeamViewer_Service, TeamViewer, tv_w32, tv_x64, CVMountd, cvd, cvfwd, CVODS, saphostexe, saposcol, sapstartsrv, avagent, avscc, DellSystem, EnterpriseClient, VeeamNFSSvc, VeeamTransportSvc, VeeamDeploymentSvc

Terminated Services via sc stop

mepocs, memtas, veeam, svc$, backup, sql, vssmsexchange, sql$, mysql, mysql$, sophos, MSExchange, MSExchange$WSBExchange, PDVFSService, BackupExecVSSProvider, BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, BackupExecManagerService, BackupExecRPCService, GxBlr, GxVss, GxCIMgr, GxCIMgrS, GxCVD, GXMMM, GxVssHWProv, GxFWD, SAPService, SAP, SAP$, SAPD$, SAPHostControl, SAPHostExec, QBCFMonitorService, QBDBMgrN, QBIDPService, AcronisAgent, VeeamNFSSvc, VeeamDeploymentService, VeeamTransportSvc, MVArmorMVarmor64, VSNAPVSS, AcrSch2Svc, DefWatchccEvtMgr, ccSetMgr, SavRoam, RTVscan, QBFCService, Intuit.QuickBooks.FCS, zhudongfangyu, stc_raw_agent, BackupExecManagementService, CASAD2DWebSvc, CAARCUpdateSv

Terminated Services via net stop

WSearchnet, MSExchangeIS, MSExchangeSA, MSExchangeADTopology, wuauserv, eventlog, MSSQLSERVER, SQLSERVERAGENT, SQLBrowser, MSSQLServerOLAPService, ReportServer, MsDtsServer, SQLWriter

Annex B

Whitelisted extensions, paths

*.exe
*.EXE
*.DLL
*.ini
*.inf
*.pol
*.cmd
*.ps1
*.vbs
*.bat
*.pagefile.sys
*.hiberfil.sys
*.drv
*.msc
*.dll
*.lock
*.sys
*.msu
*.lnk
*.search-ms
*\$Windows.~WS*
*\$windows.~ws*
*\$WINDOWS.~WS*
*\$windows.~bt*
*\$Windows.~BT*
*\$WINDOWS.~BT*
*\Windows.old*
*\NTUSER.DAT*
*\ntuser.dat*
*\autorun.inf
*\boot.ini
*\desktop.ini
*\system volume information*
*\Boot*
*\DumpStack.log.tmp
*\PerfLogs*
*\Users\*\Microsoft_Corporation\*.config
*\AppData\Local\Microsoft\GameDVR*
*\AppData\Local\Packages\Microsoft.*
*\AppData\Local\Packages\MicrosoftWindows.*
*\AppData\Local\Packages\Internet Explorer*
*\AppData\Local\Temp*
*\Program Files\Common Files\microsoft shared*
*\Program Files\Common Files\Services*
*\Program Files\Common Files\System*
*\Program Files\Internet Explorer*
*\Program Files\ModifiableWindowsApps*
*\Program Files\Uninstall Information*
*\Program Files\Windows Defender*
*\Program Files\Windows Mail*
*\Program Files\Windows Media Player*
*\Program Files\Windows NT*
*\Program Files\Windows Photo Viewer*
*\Program Files\Windows Portable Devices*
*\Program Files\Windows Security*
*\Program Files\Windows Sidebar*
*\Program Files\WindowsApps*
*\Program Files\WindowsPowerShell*
*\Program Files (x86)\Common Files*
*\Program Files (x86)\Common Files\Microsoft Shared*
*\Program Files (x86)\Common Files\Services*
*\Program Files (x86)\Common Files\System*
*\Program Files (x86)\Internet Explorer*
*\Program Files (x86)\Microsoft\*Edge*
*\Program Files (x86)\Microsoft\Temp*
*\Program Files (x86)\Microsoft.NET*
*\Program Files (x86)\Windows Defender*
*\Program Files (x86)\Windows Mail*
*\Program Files (x86)\Windows Media Player*
*\Program Files (x86)\Windows Multimedia Platform*
*\Program Files (x86)\Windows NT*
*\Program Files (x86)\Windows Photo Viewer*
*\Program Files (x86)\Windows Portable Devices*
*\Program Files (x86)\Windows Security*
*\Program Files (x86)\Windows Sidebar*
*\Program Files (x86)\WindowsPowerShell*
*\ProgramData\ssh
*\ProgramData\ntuser.pol
*\ProgramData\regid.*.com.microsoft
*\ProgramData\USOPrivate*
*\ProgramData\USOShared*
*\ProgramData\Microsoft\UEV*
*\ProgramData\Microsoft\Device Stage*
*\ProgramData\Microsoft\DeviceSync*
*\ProgramData\Microsoft\Diagnosis*
*\ProgramData\Microsoft\DiagnosticLogCSP*
*\ProgramData\Microsoft\DRM*
*\ProgramData\Microsoft\EdgeUpdate*
*\ProgramData\Microsoft\Event Viewer*
*\ProgramData\Microsoft\IdentityCRL
*\ProgramData\Microsoft\MapData*
*\ProgramData\Microsoft\MF*
*\ProgramData\Microsoft\NetFramework*
*\ProgramData\Microsoft\Network*
*\ProgramData\Microsoft\Provisioning*
*\ProgramData\Microsoft\Search*
*\ProgramData\Microsoft\SmsRouter*
*\ProgramData\Microsoft\Spectrum*
*\ProgramData\Microsoft\Speech_OneCore*
*\ProgramData\Microsoft\Storage Health*
*\ProgramData\Microsoft\User Account Pictures*
*\ProgramData\Microsoft\Vault*
*\ProgramData\Microsoft\WDF*
*\ProgramData\Microsoft\Windows*
*\ProgramData\Microsoft\Windows Defender*
*\ProgramData\Microsoft\Windows NT*
*\ProgramData\Microsoft\Windows Security Health*
*\ProgramData\Microsoft\WinMSIPC*
*\ProgramData\Microsoft\WPD*
*\ProgramData\Microsoft\Crypto\RSA\MachineKeys\*
*\ProgramData\Microsoft\ServerManager\Events\FileServer.Events.xml
*\ProgramData\Packages\USOPrivate*
*\ProgramData\Packages\WindowsHolographicDevices*
*\ProgramData\Packages\USOShared*
*\ProgramData\Packages\MicrosoftWindows.*
*\ProgramData\Packages\Microsoft.*
*\Windows\*
*\All Users\Microsoft\*
*\AppData\Local\*

Supercharge cybersecurity

Defeat threats efficiently and identify attackers proactively with a revolutionary cyber threat intelligence platform by Group-IB