Underground Ransomware Being Distributed Worldwide
The Underground ransomware gang is conducting global attacks against companies across various countries and industries. First identified in July 2023, the group resurfaced in May 2024 with a new Dedicated Leak Site. Their targets include multinational corporations from diverse sectors, with annual revenues ranging from $20 million to $650 million. The ransomware uses a combination of RNG, AES, and RSA encryption techniques, with each file encrypted using a different AES key. The malware is designed to leave insufficient traces for decryption in the local environment. It categorizes files based on size and employs a striping method for larger files. The ransomware also deletes shadow copies, restricts remote desktop connections, and stops interfering services before encryption.
AI Analysis
Technical Summary
The Underground ransomware gang, first identified in July 2023 and resurfacing in May 2024 with a new Dedicated Leak Site, is conducting widespread global ransomware attacks targeting multinational corporations across diverse industries. These targets typically have annual revenues between $20 million and $650 million, indicating a focus on mid-to-large enterprises. The ransomware employs a sophisticated encryption scheme combining Random Number Generation (RNG), AES (Advanced Encryption Standard), and RSA (Rivest–Shamir–Adleman) cryptographic techniques. Each file is encrypted with a unique AES key, enhancing the complexity of decryption efforts. For larger files, the ransomware uses a striping method, which segments files into parts before encryption, complicating recovery further. The malware categorizes files based on size to optimize encryption efficiency. Operationally, the ransomware is designed to minimize forensic traces by leaving insufficient data locally for decryption. It actively deletes shadow copies on infected systems, preventing restoration from backups stored in these snapshots. Additionally, it restricts Remote Desktop Protocol (RDP) connections and stops services that could interfere with the encryption process, ensuring uninterrupted execution. The tactics and techniques used align with MITRE ATT&CK IDs such as T1082 (System Information Discovery), T1112 (Modify Registry), T1070.001 (Clear Windows Event Logs), T1083 (File and Directory Discovery), T1562.001 (Impair Defenses: Disable or Modify Tools), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1573.002 (Encrypted Channel: Symmetric Cryptography), T1012 (Query Registry), T1021.001 (Remote Services: Remote Desktop Protocol), and T1490 (Inhibit System Recovery). Currently, there are no known exploits in the wild specifically targeting software vulnerabilities; the infection vector is not detailed but likely involves common ransomware delivery methods such as phishing, exploitation of weak credentials, or compromised remote access. The ransomware’s design to evade detection and complicate recovery makes it a formidable threat to targeted organizations.
Potential Impact
For European organizations, the Underground ransomware poses a significant risk to operational continuity, data confidentiality, and integrity. The encryption of files with unique AES keys and the use of RSA for key protection make decryption without the attacker’s private key practically impossible. The deletion of shadow copies and disabling of recovery mechanisms severely limit the ability to restore systems without paying ransom or relying on offline backups. The restriction of RDP connections and stopping of interfering services can disrupt remote management and incident response efforts, prolonging downtime. Given the targeted companies’ revenue range, these organizations likely have complex IT environments with critical business processes dependent on timely data access. Disruption could lead to financial losses, reputational damage, regulatory penalties (especially under GDPR for data breaches or loss), and potential exposure of sensitive data if data theft accompanies encryption. The global and multi-sector nature of the attacks suggests a broad impact, with European companies in France, Germany, Slovakia, and Spain explicitly identified as affected, indicating active targeting in these countries. The sophistication of the ransomware also implies that smaller organizations with less mature cybersecurity defenses could be at risk if targeted in the future.
Mitigation Recommendations
1. Implement robust, segmented, and regularly tested offline backups to ensure data recovery without paying ransom. Backups should be immutable and stored separately from production networks. 2. Harden RDP and other remote access services by enforcing multi-factor authentication (MFA), limiting access via VPNs or zero-trust network access (ZTNA), and monitoring for unusual login attempts. 3. Employ endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors such as mass file encryption, shadow copy deletion, and service stoppage. 4. Monitor and restrict the use of administrative privileges to prevent unauthorized service stoppage and registry modifications. 5. Regularly update and patch all systems to reduce attack surface, even though no specific exploits are known, to prevent lateral movement and initial access. 6. Conduct user awareness training focused on phishing and social engineering, as these remain common ransomware infection vectors. 7. Implement network segmentation to contain infections and limit ransomware propagation. 8. Enable and monitor Windows event logs and other system telemetry to detect early signs of compromise, despite the malware’s attempts to clear logs. 9. Develop and rehearse incident response plans specifically addressing ransomware scenarios, including communication strategies and legal/regulatory compliance. 10. Collaborate with threat intelligence sharing communities to stay updated on emerging tactics and indicators related to the Underground ransomware group.
Affected Countries
France, Germany, Slovakia, Spain
Indicators of Compromise
- hash: 76a3ee4f0447ad47767d2b6f808b7fc6
- hash: bbbf99de707dd28c938668d34c2e1b26
- hash: 9ba1eef332939a534fac8d38b39ecd001a8d0fa5
- hash: af40ff8d076fa667d4a2bac519b895d3ca02ac01
- hash: 56ccc7562cea5da87146fcc74b158051bf4e52e5e163ad4e810a417726382975
- hash: b6cd9094503f184c05afb851644c079dc177001fa2b2286cdb5861338cdb655a
Underground Ransomware Being Distributed Worldwide
Description
The Underground ransomware gang is conducting global attacks against companies across various countries and industries. First identified in July 2023, the group resurfaced in May 2024 with a new Dedicated Leak Site. Their targets include multinational corporations from diverse sectors, with annual revenues ranging from $20 million to $650 million. The ransomware uses a combination of RNG, AES, and RSA encryption techniques, with each file encrypted using a different AES key. The malware is designed to leave insufficient traces for decryption in the local environment. It categorizes files based on size and employs a striping method for larger files. The ransomware also deletes shadow copies, restricts remote desktop connections, and stops interfering services before encryption.
AI-Powered Analysis
Technical Analysis
The Underground ransomware gang, first identified in July 2023 and resurfacing in May 2024 with a new Dedicated Leak Site, is conducting widespread global ransomware attacks targeting multinational corporations across diverse industries. These targets typically have annual revenues between $20 million and $650 million, indicating a focus on mid-to-large enterprises. The ransomware employs a sophisticated encryption scheme combining Random Number Generation (RNG), AES (Advanced Encryption Standard), and RSA (Rivest–Shamir–Adleman) cryptographic techniques. Each file is encrypted with a unique AES key, enhancing the complexity of decryption efforts. For larger files, the ransomware uses a striping method, which segments files into parts before encryption, complicating recovery further. The malware categorizes files based on size to optimize encryption efficiency. Operationally, the ransomware is designed to minimize forensic traces by leaving insufficient data locally for decryption. It actively deletes shadow copies on infected systems, preventing restoration from backups stored in these snapshots. Additionally, it restricts Remote Desktop Protocol (RDP) connections and stops services that could interfere with the encryption process, ensuring uninterrupted execution. The tactics and techniques used align with MITRE ATT&CK IDs such as T1082 (System Information Discovery), T1112 (Modify Registry), T1070.001 (Clear Windows Event Logs), T1083 (File and Directory Discovery), T1562.001 (Impair Defenses: Disable or Modify Tools), T1027 (Obfuscated Files or Information), T1486 (Data Encrypted for Impact), T1573.002 (Encrypted Channel: Symmetric Cryptography), T1012 (Query Registry), T1021.001 (Remote Services: Remote Desktop Protocol), and T1490 (Inhibit System Recovery). Currently, there are no known exploits in the wild specifically targeting software vulnerabilities; the infection vector is not detailed but likely involves common ransomware delivery methods such as phishing, exploitation of weak credentials, or compromised remote access. The ransomware’s design to evade detection and complicate recovery makes it a formidable threat to targeted organizations.
Potential Impact
For European organizations, the Underground ransomware poses a significant risk to operational continuity, data confidentiality, and integrity. The encryption of files with unique AES keys and the use of RSA for key protection make decryption without the attacker’s private key practically impossible. The deletion of shadow copies and disabling of recovery mechanisms severely limit the ability to restore systems without paying ransom or relying on offline backups. The restriction of RDP connections and stopping of interfering services can disrupt remote management and incident response efforts, prolonging downtime. Given the targeted companies’ revenue range, these organizations likely have complex IT environments with critical business processes dependent on timely data access. Disruption could lead to financial losses, reputational damage, regulatory penalties (especially under GDPR for data breaches or loss), and potential exposure of sensitive data if data theft accompanies encryption. The global and multi-sector nature of the attacks suggests a broad impact, with European companies in France, Germany, Slovakia, and Spain explicitly identified as affected, indicating active targeting in these countries. The sophistication of the ransomware also implies that smaller organizations with less mature cybersecurity defenses could be at risk if targeted in the future.
Mitigation Recommendations
1. Implement robust, segmented, and regularly tested offline backups to ensure data recovery without paying ransom. Backups should be immutable and stored separately from production networks. 2. Harden RDP and other remote access services by enforcing multi-factor authentication (MFA), limiting access via VPNs or zero-trust network access (ZTNA), and monitoring for unusual login attempts. 3. Employ endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors such as mass file encryption, shadow copy deletion, and service stoppage. 4. Monitor and restrict the use of administrative privileges to prevent unauthorized service stoppage and registry modifications. 5. Regularly update and patch all systems to reduce attack surface, even though no specific exploits are known, to prevent lateral movement and initial access. 6. Conduct user awareness training focused on phishing and social engineering, as these remain common ransomware infection vectors. 7. Implement network segmentation to contain infections and limit ransomware propagation. 8. Enable and monitor Windows event logs and other system telemetry to detect early signs of compromise, despite the malware’s attempts to clear logs. 9. Develop and rehearse incident response plans specifically addressing ransomware scenarios, including communication strategies and legal/regulatory compliance. 10. Collaborate with threat intelligence sharing communities to stay updated on emerging tactics and indicators related to the Underground ransomware group.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/89835"]
- Adversary
- Underground
- Pulse Id
- 68af30b7cd42cadb1e4cffbd
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash76a3ee4f0447ad47767d2b6f808b7fc6 | — | |
hashbbbf99de707dd28c938668d34c2e1b26 | — | |
hash9ba1eef332939a534fac8d38b39ecd001a8d0fa5 | — | |
hashaf40ff8d076fa667d4a2bac519b895d3ca02ac01 | — | |
hash56ccc7562cea5da87146fcc74b158051bf4e52e5e163ad4e810a417726382975 | — | |
hashb6cd9094503f184c05afb851644c079dc177001fa2b2286cdb5861338cdb655a | — |
Threat ID: 68af5d62ad5a09ad0065aba9
Added to database: 8/27/2025, 7:32:50 PM
Last enriched: 8/27/2025, 7:48:01 PM
Last updated: 8/31/2025, 6:26:59 PM
Views: 16
Related Threats
ThreatFox IOCs for 2025-08-30
MediumThreatFox IOCs for 2025-08-29
MediumOperation HanKook Phantom: Spear-Phishing Campaign
MediumThe First AI-Powered Ransomware & How It Works
MediumAI Waifu RAT: A Ring3 malware-like RAT based on LLM manipulation is circulating in the wild.
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.