blog.morphisec.com Open in urlscan Pro
199.60.103.225  Public Scan

Submitted URL: https://u33254697.ct.sendgrid.net/ls/click?upn=u001.rfmZKoSIQF-2FqHrRaNSBoLz30vLIaNV6YIZjr-2BP6-2Foh8HbCATPaMnFzi8XwOaekhl2S5QJhgP...
Effective URL: https://blog.morphisec.com/cicada3301-ransomware-threat-analysis
Submission: On September 07 via api from IL — Scanned from IL

Form analysis 4 forms found in the DOM

/hs-search-results

<form action="/hs-search-results" data-hs-cf-bound="true" data-cb-wrapper="true">
  <input type="text" class="hs-search-field__input form-control" name="term" placeholder="Search" autocomplete="off" aria-label="Search">
</form>

/hs-search-results

<form action="/hs-search-results" data-hs-cf-bound="true" data-cb-wrapper="true">
  <input type="text" class="hs-search-field__input form-control" name="term" placeholder="Search" autocomplete="off" aria-label="Search">
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1534169/37b11fda-a2aa-4805-9c0e-bae8eaccd6b7

<form id="hsForm_37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1534169/37b11fda-a2aa-4805-9c0e-bae8eaccd6b7"
  class="hs-form-private hsForm_37b11fda-a2aa-4805-9c0e-bae8eaccd6b7 hs-form-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7 hs-form-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_117f8346-1aa3-415a-89c7-c126861680ce hs-form stacked hs-custom-form"
  target="target_iframe_37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" data-instance-id="117f8346-1aa3-415a-89c7-c126861680ce" data-form-id="37b11fda-a2aa-4805-9c0e-bae8eaccd6b7" data-portal-id="1534169"
  data-test-id="hsForm_37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" data-hs-cf-bound="true" data-cb-wrapper="true">
  <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field smart-field"><label id="label-firstname-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" class="" placeholder="Enter your "
      for="firstname-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="firstname-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" name="firstname" required="" placeholder="First Name*" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
  </div>
  <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field smart-field"><label id="label-lastname-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" class="" placeholder="Enter your "
      for="lastname-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="lastname-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" name="lastname" required="" placeholder="Last Name*" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" class="" placeholder="Enter your " for="email-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" name="email" required="" placeholder="Email*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_company hs-company hs-fieldtype-text field hs-form-field smart-field"><label id="label-company-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" class="" placeholder="Enter your "
      for="company-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="company-37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" name="company" required="" placeholder="Company*" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1725734116961&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1724683265867&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Decoding the Puzzle: Cicada3301 Ransomware Threat Analysis&quot;,&quot;pageUrl&quot;:&quot;https://blog.morphisec.com/cicada3301-ransomware-threat-analysis&quot;,&quot;pageId&quot;:&quot;177081907483&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://blog.morphisec.com/cicada3301-ransomware-threat-analysis&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;c3edc106a44a1f3013f1188d805ec797&quot;,&quot;__hsfp&quot;:3755041163,&quot;__hssc&quot;:&quot;182053752.1.1725734120010&quot;,&quot;__hstc&quot;:&quot;182053752.c3edc106a44a1f3013f1188d805ec797.1725734120010.1725734120010.1725734120010.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_module_1541132004988163&quot;,&quot;formInstanceId&quot;:&quot;5019&quot;,&quot;rawInlineMessage&quot;:&quot;Thanks for submitting the form.&quot;,&quot;hsFormKey&quot;:&quot;d9c5f68f62f6aa0828a6851dd171f42a&quot;,&quot;pageName&quot;:&quot;Decoding the Puzzle: Cicada3301 Ransomware Threat Analysis&quot;,&quot;rumScriptExecuteTime&quot;:2140.2999997138977,&quot;rumTotalRequestTime&quot;:2426.9000000953674,&quot;rumTotalRenderTime&quot;:2461.4000000953674,&quot;rumServiceResponseTime&quot;:286.6000003814697,&quot;rumFormRenderTime&quot;:34.5,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1725734120029,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1534169&quot;,&quot;formId&quot;:&quot;37b11fda-a2aa-4805-9c0e-bae8eaccd6b7&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_module_1541132004988163&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;5019&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;Thanks for submitting the form.&quot;,&quot;isMobileResponsive&quot;:true,&quot;rawInlineMessage&quot;:&quot;Thanks for submitting the form.&quot;,&quot;hsFormKey&quot;:&quot;d9c5f68f62f6aa0828a6851dd171f42a&quot;,&quot;pageName&quot;:&quot;Decoding the Puzzle: Cicada3301 Ransomware Threat Analysis&quot;,&quot;pageId&quot;:&quot;177081907483&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;117f8346-1aa3-415a-89c7-c126861680ce&quot;,&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;email&quot;,&quot;company&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.5999&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.5999&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;5999&quot;,&quot;allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;177081907483&quot;,&quot;analyticsPageId&quot;:&quot;177081907483&quot;,&quot;contentPageId&quot;:177081907483,&quot;contentAnalyticsPageId&quot;:&quot;177081907483&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1725734117080,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;getExtraMetaDataBeforeSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1725734117081,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Decoding the Puzzle: Cicada3301 Ransomware Threat Analysis\&quot;,\&quot;pageUrl\&quot;:\&quot;https://blog.morphisec.com/cicada3301-ransomware-threat-analysis\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36\&quot;,\&quot;pageId\&quot;:\&quot;177081907483\&quot;,\&quot;contentAnalyticsPageId\&quot;:\&quot;177081907483\&quot;,\&quot;contentPageId\&quot;:177081907483,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1725734117083,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;IL\&quot;&quot;},{&quot;clientTimestamp&quot;:1725734120024,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;c3edc106a44a1f3013f1188d805ec797\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://blog.morphisec.com/cicada3301-ransomware-threat-analysis\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;177081907483\&quot;}&quot;}]}"><iframe
    name="target_iframe_37b11fda-a2aa-4805-9c0e-bae8eaccd6b7_5019" style="display: none;"></iframe>
</form>

/hs-search-results

<form data-hs-do-not-collect="true" action="/hs-search-results" data-cb-wrapper="true">
  <input type="text" class="hs-search-field__input" name="term" autocomplete="off" aria-label="Search" placeholder="Keyword...">
  <input type="hidden" name="type" value="SITE_PAGE">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="type" value="LISTING_PAGE">
</form>

Text Content

Recent Webinar: Building an Adaptive Cyber Resilient Cloud
Watch now

 * Support
 * Partners
 * Under Attack?

 * Products
   * Product Overview
   * Adaptive Exposure Management
   * Morphisec for Windows Endpoints
   * Morphisec for Windows Servers & Workloads
   * Morphisec for Linux Server Protection
   * Incident Response Services
   * About Moving Target Defense
 * Solutions
   * By Industry
     * Finance
     * Hedge Funds
     * Healthcare
     * Technology
     * Manufacturing
     * Legal
     * K-12 Education
     * SMB
   * By Use Case
     * Microsoft Defender AV
     * Microsoft Defender for Endpoint
     * Virtual Desktop Protection
     * Cloud Workload Protection
     * Remote Employee Security
     * Ransomware Prevention
     * Virtual Patching and Compliance
     * Supply Chain Attack Protection
     * Browser Attack Protection
 * Company
   * About Us
   * News & Events
   * Careers
   * Contact Us
 * Resources
   * Blog
   * Learning Center
   * Customer Stories

Read the Blog
Get A Demo
 * Products
   * Main Menu
   * Products
   * Product Overview
   * Adaptive Exposure Management
   * Morphisec for Windows Endpoints
   * Morphisec for Windows Servers & Workloads
   * Morphisec for Linux Server Protection
   * Incident Response Services
   * About Moving Target Defense
 * Solutions
   * Main Menu
   * Solutions
   * By Industry
     * Finance
     * Hedge Funds
     * Healthcare
     * Technology
     * Manufacturing
     * Legal
     * K-12 Education
     * SMB
   * By Use Case
     * Microsoft Defender AV
     * Microsoft Defender for Endpoint
     * Virtual Desktop Protection
     * Cloud Workload Protection
     * Remote Employee Security
     * Ransomware Prevention
     * Virtual Patching and Compliance
     * Supply Chain Attack Protection
     * Browser Attack Protection
 * Company
   * Main Menu
   * Company
   * About Us
   * News & Events
   * Careers
   * Contact Us
 * Resources
   * Main Menu
   * Resources
   * Learning Center
   * Customer Stories
 * Blog
 * Support
 * Partners
 * Under Attack?

 * Read the Blog
 * Get A Demo

Cybersecurity Blog

Cybersecurity News, Threat Research, and more from the Team Spearheading the
Evolution of Endpoint Security


DECODING THE PUZZLE: CICADA3301 RANSOMWARE THREAT ANALYSIS

Posted by Michael Gorelik on September 3, 2024
Find me on:
LinkedIn Twitter
 * 
 * Share
 * 



In the rapidly evolving landscape of cybersecurity threats, a new adversary has
emerged, drawing inspiration from one of the internet’s most enigmatic
puzzles—Cicada3301. This new threat, dubbed Cicada3301 ransomware, was
identified in a Morphisec customer environment just a week ago after bypassing a
leading endpoint and detection and response (EDR) provider solution.  




INTRODUCTION

Cicada3301 ransomware, written in Rust, was first reported less than two months
ago. Despite its recent emergence, Morphisec threat researchers have already
identified striking similarities between Cicada3301 and the infamous BlackCat
ransomware.  

Like its namesake, the Cicada puzzle, which has long been associated with
complex, cyber-related problem-solving, the true identity of the Cicada3301
ransomware developers remains shrouded in mystery. 

However, it's crucial to note that Morphisec's anti-ransomware impact protection
has already proven effective against Cicada3301 without requiring any updates,
highlighting Morphisec’s robustness and adaptability in the face of emerging
threats. 

During Morphisec’s investigation, additional tools were uncovered, such as
EDRSandBlast, which is used to tamper with EDR systems. With the limited
visibility Morphisec researchers currently have, it appears that Cicada3301
ransomware primarily targets small to medium-sized businesses (SMBs), likely
through opportunistic attacks that exploit vulnerabilities as the initial access
vector. 




Since June 18, 2024, Morphisec has counted more than 20 victims, predominately
located in North America and England. Impacted organizations vary in size, from
SMB (13 organizations) and mid-sized businesses (5 organizations) to enterprise
(3). Industries of operation include manufacturing/industrial, healthcare,
retail and hospitality. Attackers accept payment in Bitcoin and Monero. 


 




TECHNICAL DETAILS 

Cicada3301 ransomware shares several core characteristics with the well-known
Rust-based ransomware, BlackCat. 

It features a well-defined parameter configuration interface, registers a vector
exception handler, and employs similar methods for shadow copy deletion and
tampering. This trend of using Rust in ransomware development is on the rise,
with other notable examples including Hive and RansomExx, due to Rust's
efficiency and cross-platform capabilities. 

However, Cicada3301 distinguishes itself with significant innovations,
particularly in how it executes and integrates compromised credentials, marking
an evolution in ransomware tactics. 

 


DOWNLOAD MORPHISEC’S FULL CICADA3301 ANALYSIS INCLUDING INDICATORS OF COMPROMISE
(IOCS)  



 


HOW MORPHISEC HELPS 

Powered by Automated Moving Target Defense (AMTD), Morphisec’s Anti-Ransomware
Assurance Suite stops ransomware attacks like Cicada3301 with multi-layered
protection. 

Ransomware infiltration protection prevents the execution of ransomware attacks
at early infiltration stages with Morphisec’s prevention-first AMTD technology
that constantly changes a system’s configuration or environment. This makes it
harder for attackers to exploit systems as the attack surface is always
shifting. 

Ransomware impact protection defends systems against the ransomware impact phase
with dedicated anti-ransomware protection that proactively defends critical
assets and files with a prevention-first strategy. This minimizes recovery times
and strengthens an organization’s anti-ransomware stance. 

Preventatively, Adaptive Exposure Management (AEM) helps teams adapt by
pre-emptively defending against attacks. AEM prioritizes vulnerabilities,
automates the assessment and validation of an organization’s security controls,
identifies high-risk software and addresses security misconfigurations. 

Morphisec doesn’t rely on signature or behavioral patterns. Instead, its
patented AMTD technology prevents an attack at its earliest stages, preemptively
blocking attacks on memory and applications, and effectively remediating the
need for response.   

 

Schedule a demo today to see how Morphisec stops ransomware and other new and
emerging threats.    




SUBSCRIBE TO OUR BLOG

Stay in the loop with industry insight, cyber security trends, and cyber attack
information and company updates.





SEARCH OUR SITE




RECENT POSTS

 * Vulnerability Whisperer: Turning Headaches to High-Fives
 * Decoding the Puzzle: Cicada3301 Ransomware Threat Analysis
 * Preventing Threats Before Infiltration: Morphisec AMTD in Action
 * From Trading Floors to ATMs: 5 Unexpected Cyber Exposure Challenges in
   Finance
 * Staying One Step Ahead: The Ultimate Anti-Ransomware Assurance Checklist
 * AMTD Featured in Gartner® Hype Cycle™ for Endpoint and Workspace Security,
   2024
 * Technical Analysis: CVE-2024-38021
 * CVE-2024-38173: Outlook Form Injection RCE Vulnerability Patched
 * Technical Analysis: CVE-2024-30103
 * The Evolution of MDR: Adding Prevention First


POSTS BY TAG

 * Automated Moving Target Defense (147)
 * Cyber Security News (130)
 * Threat Research (128)
 * Morphisec Labs (117)
 * Morphisec News (55)
 * Defense-in-Depth (12)
 * Gartner (8)
 * Adaptive Exposure Management (7)
 * Continuous Threat Exposure Management (CTEM) (7)
 * Ransomware (7)
 * In-Memory Attacks (6)
 * Threat and Vulnerability Management (5)
 * Microsoft (4)
 * Runtime Attacks (4)
 * Advanced Threat Defense (3)
 * Evasive Loader (3)
 * Fileless Malware (3)
 * Financial Cybersecurity (3)
 * Legacy Security (3)
 * Linux Cybersecurity (3)
 * ChatGPT (2)
 * Healthcare Cybersecurity (2)
 * Patch Management (2)
 * Product Blogs (2)
 * Anti-tampering (1)
 * IoT Security (1)
 * Managed Service Providers (1)
 * Server Security (1)

See all
 * Products
   * Product Overview
   * Morphisec for Windows Endpoints
   * Morphisec for Windows Servers & Workloads
   * Morphisec for Linux Server Protection
   * Morphisec Vulnerability Visibility & Prioritization
   * Incident Response Services
   * About Moving Target Defense
 * Solutions By Industry
   * Banking & Finance
   * Hedge Funds
   * Healthcare
   * Technology
   * Manufacturing
   * Legal
   * K-12 Education
   * SMB
 * Solutions by Use Case
   * Microsoft Defender for Endpoint
   * Microsoft Defender AV
   * Virtual Desktop Protection
   * Ransomware Protection
   * Supply Chain Attack Protection
   * Cloud Workload Protection
   * Remote Employee Security
   * Virtual Patching & Compliance
   * Browser Attack Protection

 * Company
   * About Us
   * News & Events
   * Careers
 * Blog
 * Support
 * Partners
 * Contact Us
 * Privacy & Legal
 * Contact Sales
 * Inquire via Azure

 * 
 * 
 * 

© 2024 Morphisec Ltd. | All rights reserved







Privacy policy |


WE USE COOKIES

We may place these for analysis of our visitor data, to improve our website,
show personalised content and to give you a great website experience. For more
information about the cookies we use open the settings.

Your consent and the cookie policy apply to all websites of "Morphisec Group",
including: morphisec.com, Engage Morphisec, Morphisec Blog.

Deny
No, adjust
Accept all