Unmasking the new Chaos RaaS group attacks
Cisco Talos Incident Response has observed attacks by Chaos, a new ransomware-as-a-service group conducting big-game hunting and double extortion attacks. The group uses spam flooding, voice-based social engineering, RMM tool abuse, and legitimate file-sharing software for data exfiltration. Their ransomware employs multi-threaded rapid selective encryption and anti-analysis techniques, targeting both local and network resources. Chaos is likely formed by former BlackSuit (Royal) gang members, based on similarities in encryption methodology, ransom note structure, and toolset. The group has impacted various business verticals, predominantly in the U.S., UK, New Zealand, and India. They use the '.chaos' file extension and demand ransoms around $300K, threatening data disclosure and DDoS attacks if not paid.
AI Analysis
Technical Summary
The Chaos ransomware-as-a-service (RaaS) group represents a sophisticated and emerging threat actor specializing in big-game hunting and double extortion ransomware attacks. Observed by Cisco Talos Incident Response, Chaos leverages a multi-faceted attack methodology that includes spam flooding campaigns, voice-based social engineering to manipulate victims, abuse of remote monitoring and management (RMM) tools, and the use of legitimate file-sharing software to exfiltrate sensitive data. Their ransomware employs advanced technical features such as multi-threaded rapid selective encryption, which allows efficient encryption of targeted files both locally and across network resources, and anti-analysis techniques designed to evade detection and forensic investigation. The group is believed to be composed of former members of the BlackSuit (also known as Royal) ransomware gang, as evidenced by similarities in encryption methods, ransom note formatting, and toolsets. The ransomware appends the '.chaos' file extension to encrypted files and demands ransoms typically around $300,000. In addition to encryption, the group threatens victims with data disclosure and distributed denial-of-service (DDoS) attacks to increase pressure for ransom payment. While primarily impacting business verticals in the United States, United Kingdom, New Zealand, and India, the tactics and tools used by Chaos indicate a high level of operational sophistication and adaptability. Indicators of compromise include specific IP addresses and file hashes linked to the group’s infrastructure and malware samples. The group’s use of social engineering combined with technical exploitation of RMM tools and legitimate software for exfiltration highlights the complexity and multi-vector nature of their attacks.
Potential Impact
For European organizations, the Chaos ransomware group poses a significant risk due to its targeted big-game hunting approach and double extortion tactics. The potential impacts include severe operational disruption from rapid encryption of critical local and networked data, financial losses from ransom payments averaging around $300,000, and reputational damage stemming from threatened or actual data leaks. The use of legitimate file-sharing tools for exfiltration complicates detection and response efforts, increasing the likelihood of sensitive data exposure under GDPR regulations, which could lead to substantial regulatory fines and legal consequences. The threat of follow-up DDoS attacks further exacerbates availability risks, potentially impacting online services and customer-facing platforms. European businesses with remote management infrastructure or those relying on third-party RMM tools are particularly vulnerable. The multi-threaded encryption and anti-analysis features suggest that once inside a network, Chaos ransomware can quickly propagate and evade traditional defenses, making incident response more challenging. The medium severity rating reflects the combination of high ransom demands and sophisticated attack methods balanced against the current geographic focus and lack of known widespread exploits in the wild.
Mitigation Recommendations
European organizations should implement a layered defense strategy tailored to the specific tactics employed by Chaos ransomware. Key measures include: 1) Enhancing email security to detect and block spam flooding campaigns and phishing attempts, including advanced anti-spam filters and user awareness training focused on voice-based social engineering threats. 2) Strictly controlling and monitoring RMM tool usage by enforcing least privilege principles, multi-factor authentication (MFA), and logging all remote access sessions for anomaly detection. 3) Deploying network segmentation to limit lateral movement and restrict access to sensitive data repositories. 4) Monitoring and restricting the use of legitimate file-sharing software, employing data loss prevention (DLP) solutions to detect unauthorized data exfiltration. 5) Utilizing endpoint detection and response (EDR) tools capable of identifying multi-threaded encryption behavior and anti-analysis techniques. 6) Maintaining up-to-date backups with offline or immutable storage to enable rapid recovery without paying ransom. 7) Conducting regular threat hunting and incident response exercises simulating Chaos ransomware scenarios. 8) Collaborating with threat intelligence sharing platforms to stay informed about emerging indicators and tactics. These targeted controls go beyond generic advice by addressing the specific operational methods of the Chaos group.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy
Indicators of Compromise
- ip: 45.61.134.36
- hash: 160f60dc3fc9920cfc3847de4de2ef09
- hash: 87fd821b67a1f329548f222d81a55be7
- hash: 9113f4b245da32c75d61b467ee89e0b7
- hash: 21f974f224cef8bcaa194bed75f25ee28e1ca8d4
- hash: 34a45f4172a355bf532185a83d0dd55df9794e91
- hash: bb73d57a43b27c11baf6f221ad17c0a83a08f752
- hash: 11cfea4100ba3731d859148d2011c7225d337db22797f7e111c0f2876e986490
- hash: 1d846592ffcc19ed03a34316520aa31369218a88afa4e17ac547686d0348aa5b
- hash: 7c4b465159e1c7dbbe67f0eeb3f58de1caba293999a49843a0818480f05be14e
- ip: 107.170.35.225
- ip: 144.172.103.42
Unmasking the new Chaos RaaS group attacks
Description
Cisco Talos Incident Response has observed attacks by Chaos, a new ransomware-as-a-service group conducting big-game hunting and double extortion attacks. The group uses spam flooding, voice-based social engineering, RMM tool abuse, and legitimate file-sharing software for data exfiltration. Their ransomware employs multi-threaded rapid selective encryption and anti-analysis techniques, targeting both local and network resources. Chaos is likely formed by former BlackSuit (Royal) gang members, based on similarities in encryption methodology, ransom note structure, and toolset. The group has impacted various business verticals, predominantly in the U.S., UK, New Zealand, and India. They use the '.chaos' file extension and demand ransoms around $300K, threatening data disclosure and DDoS attacks if not paid.
AI-Powered Analysis
Technical Analysis
The Chaos ransomware-as-a-service (RaaS) group represents a sophisticated and emerging threat actor specializing in big-game hunting and double extortion ransomware attacks. Observed by Cisco Talos Incident Response, Chaos leverages a multi-faceted attack methodology that includes spam flooding campaigns, voice-based social engineering to manipulate victims, abuse of remote monitoring and management (RMM) tools, and the use of legitimate file-sharing software to exfiltrate sensitive data. Their ransomware employs advanced technical features such as multi-threaded rapid selective encryption, which allows efficient encryption of targeted files both locally and across network resources, and anti-analysis techniques designed to evade detection and forensic investigation. The group is believed to be composed of former members of the BlackSuit (also known as Royal) ransomware gang, as evidenced by similarities in encryption methods, ransom note formatting, and toolsets. The ransomware appends the '.chaos' file extension to encrypted files and demands ransoms typically around $300,000. In addition to encryption, the group threatens victims with data disclosure and distributed denial-of-service (DDoS) attacks to increase pressure for ransom payment. While primarily impacting business verticals in the United States, United Kingdom, New Zealand, and India, the tactics and tools used by Chaos indicate a high level of operational sophistication and adaptability. Indicators of compromise include specific IP addresses and file hashes linked to the group’s infrastructure and malware samples. The group’s use of social engineering combined with technical exploitation of RMM tools and legitimate software for exfiltration highlights the complexity and multi-vector nature of their attacks.
Potential Impact
For European organizations, the Chaos ransomware group poses a significant risk due to its targeted big-game hunting approach and double extortion tactics. The potential impacts include severe operational disruption from rapid encryption of critical local and networked data, financial losses from ransom payments averaging around $300,000, and reputational damage stemming from threatened or actual data leaks. The use of legitimate file-sharing tools for exfiltration complicates detection and response efforts, increasing the likelihood of sensitive data exposure under GDPR regulations, which could lead to substantial regulatory fines and legal consequences. The threat of follow-up DDoS attacks further exacerbates availability risks, potentially impacting online services and customer-facing platforms. European businesses with remote management infrastructure or those relying on third-party RMM tools are particularly vulnerable. The multi-threaded encryption and anti-analysis features suggest that once inside a network, Chaos ransomware can quickly propagate and evade traditional defenses, making incident response more challenging. The medium severity rating reflects the combination of high ransom demands and sophisticated attack methods balanced against the current geographic focus and lack of known widespread exploits in the wild.
Mitigation Recommendations
European organizations should implement a layered defense strategy tailored to the specific tactics employed by Chaos ransomware. Key measures include: 1) Enhancing email security to detect and block spam flooding campaigns and phishing attempts, including advanced anti-spam filters and user awareness training focused on voice-based social engineering threats. 2) Strictly controlling and monitoring RMM tool usage by enforcing least privilege principles, multi-factor authentication (MFA), and logging all remote access sessions for anomaly detection. 3) Deploying network segmentation to limit lateral movement and restrict access to sensitive data repositories. 4) Monitoring and restricting the use of legitimate file-sharing software, employing data loss prevention (DLP) solutions to detect unauthorized data exfiltration. 5) Utilizing endpoint detection and response (EDR) tools capable of identifying multi-threaded encryption behavior and anti-analysis techniques. 6) Maintaining up-to-date backups with offline or immutable storage to enable rapid recovery without paying ransom. 7) Conducting regular threat hunting and incident response exercises simulating Chaos ransomware scenarios. 8) Collaborating with threat intelligence sharing platforms to stay informed about emerging indicators and tactics. These targeted controls go beyond generic advice by addressing the specific operational methods of the Chaos group.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.talosintelligence.com/new-chaos-ransomware/"]
- Adversary
- null
- Pulse Id
- 68b1c325bd3b4a24b371dd29
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip45.61.134.36 | CC=US ASN=AS46261 quickpacket llc | |
ip107.170.35.225 | CC=US ASN=AS14061 digitalocean llc | |
ip144.172.103.42 | CC=US ASN=AS53667 frantech solutions |
Hash
Value | Description | Copy |
---|---|---|
hash160f60dc3fc9920cfc3847de4de2ef09 | MD5 of 7c4b465159e1c7dbbe67f0eeb3f58de1caba293999a49843a0818480f05be14e | |
hash87fd821b67a1f329548f222d81a55be7 | MD5 of 1d846592ffcc19ed03a34316520aa31369218a88afa4e17ac547686d0348aa5b | |
hash9113f4b245da32c75d61b467ee89e0b7 | MD5 of 11cfea4100ba3731d859148d2011c7225d337db22797f7e111c0f2876e986490 | |
hash21f974f224cef8bcaa194bed75f25ee28e1ca8d4 | SHA1 of 1d846592ffcc19ed03a34316520aa31369218a88afa4e17ac547686d0348aa5b | |
hash34a45f4172a355bf532185a83d0dd55df9794e91 | SHA1 of 11cfea4100ba3731d859148d2011c7225d337db22797f7e111c0f2876e986490 | |
hashbb73d57a43b27c11baf6f221ad17c0a83a08f752 | SHA1 of 7c4b465159e1c7dbbe67f0eeb3f58de1caba293999a49843a0818480f05be14e | |
hash11cfea4100ba3731d859148d2011c7225d337db22797f7e111c0f2876e986490 | — | |
hash1d846592ffcc19ed03a34316520aa31369218a88afa4e17ac547686d0348aa5b | — | |
hash7c4b465159e1c7dbbe67f0eeb3f58de1caba293999a49843a0818480f05be14e | — |
Threat ID: 68b1c49cad5a09ad0079006c
Added to database: 8/29/2025, 3:17:48 PM
Last enriched: 8/29/2025, 3:33:26 PM
Last updated: 8/31/2025, 12:07:06 PM
Views: 14
Related Threats
ThreatFox IOCs for 2025-08-30
MediumThreatFox IOCs for 2025-08-29
MediumOperation HanKook Phantom: Spear-Phishing Campaign
MediumThe First AI-Powered Ransomware & How It Works
MediumAI Waifu RAT: A Ring3 malware-like RAT based on LLM manipulation is circulating in the wild.
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.