unit42.paloaltonetworks.com
Open in
urlscan Pro
23.56.206.30
Public Scan
Submitted URL: https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/'
Effective URL: https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/
Submission: On November 22 via api from US — Scanned from DE
Effective URL: https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/
Submission: On November 22 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMName: Unit42_Subscribe — POST https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json
<form action="https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json" method="post" novalidate="" class="subscribe-form" name="Unit42_Subscribe" id="unit42footerSubscription_form">
<input type="hidden" name="emailFormMask" value="">
<input type="hidden" value="1086" name="formid">
<input type="hidden" value="531-OCS-018" name="munchkinId">
<input type="hidden" value="2141" name="lpId">
<input type="hidden" value="1203" name="programId">
<input type="hidden" value="1086" name="formVid">
<input type="hidden" name="mkto_optinunit42" value="true">
<input type="hidden" name="mkto_opt-in" value="true">
<div class="form-group">
<label for="newsletter-email" id="newsletter-email-label">Your Email</label>
<input type="emal" placeholder="Your Email" name="Email" class="subscribe-field" id="newsletter-email" aria-labelledby="newsletter-email-label">
<p class="error-mail mb-15 text-danger" style="color: #dc3545"></p>
<p>Subscribe for email updates to all Unit 42 threat research.<br>By submitting this form, you agree to our
<a title="Terms of Use" href="https://www.paloaltonetworks.com/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="Get updates from Unit 42:Terms of Use">Terms of Use</a> and acknowledge our
<a title="Privacy Statement" href="https://www.paloaltonetworks.com/legal-notices/privacy" data-page-track="true" data-page-track-value="Get updates from Unit 42:Privacy Statement">Privacy Statement.</a></p>
<div class="g-recaptcha" data-expired-callback="captchaExpires" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
<p class="error-recaptcha d-none mt-15 text-danger" style="color: #dc3545">Invalid captcha!</p>
<button class="l-btn is-disabled" data-page-track="true" data-page-track-value="footer:Get updates from Unit 42:Subscribe" id="unit42footerSubscription_form_button"> Subscribe <img class="lozad"
data-src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/right-arrow.svg" alt="Right Arrow">
<img src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/icon-loader.svg" alt="loader" class="loader">
</button>
<div class="form-success-message"></div>
</div>
</form>
Text Content
Menu * Tools * ATOMs * Security Consulting * About Us * Under Attack? * * About Unit 42 * Services Services Assess and Test Your Security Controls * AI Security Assessment * Attack Surface Assessment * Breach Readiness Review * BEC Readiness Assessment * Cloud Security Assessment * Compromise Assessment * Cyber Risk Assessment * M&A Cyber Due Diligence * Penetration Testing * Purple Team Exercises * Ransomware Readiness Assessment * SOC Assessment * Supply Chain Risk Assessment * Tabletop Exercises * Unit 42 Retainer Transform Your Security Strategy * IR Plan Development and Review * Security Program Design * Virtual CISO * Zero Trust Advisory Respond in Record Time * Cloud Incident Response * Digital Forensics * Incident Response * Managed Detection and Response * Managed Threat Hunting * Unit 42 Retainer UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more * Unit 42 Threat Research Unit 42 Threat Research Unit 42 Threat Research * Threat Briefs and Assessments Details on the latest cyber threats * Tools Lists of public tools released by our team * Threat Reports Downloadable, in-depth research reports THREAT REPORT 2024 Unit 42 Incident Response Report Read now THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT REPORT Highlights from the Unit 42 Cloud Threat Report, Volume 6 Learn more * Partners Partners Partners * Threat Intelligence Sharing * Law Firms and Insurance Providers THREAT REPORT 2022 Unit 42 Ransomware Threat Report: Understand trends and tactics to bolster defenses Learn more THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT BRIEF Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email Compromise Ring Members Learn more * Resources Resources Resources * Research Reports * Webinars * Customer Stories * Datasheets * Videos * Infographics * Whitepapers * Cyberpedia Industries * Financial Services * Healthcare * Manufacturing ANALYST REPORT Unit 42® has been named a Leader in “The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024.” Read the Forrester report to learn why. Get the report THREAT REPORT Unit 42 Threat Frontier Report: Discover the latest insights on how threat actors are leveraging GenAI to exploit vulnerabilities — and learn what steps you can take to protect yourself. Get the report * * Under Attack? Search All * Tech Docs Close search modal * Threat Research Center * Threat Actor Groups * Ransomware Ransomware BLING LIBRA’S TACTICAL EVOLUTION: THE THREAT ACTOR GROUP BEHIND SHINYHUNTERS RANSOMWARE 13 min read Related Products Code to Cloud PlatformCortexCortex XDRCortex XSIAMPrisma CloudUnit 42 Incident Response * By: * Margaret Kelley * Chandni Vaya * Published:August 23, 2024 * Categories: * Cloud Cybersecurity Research * Ransomware * Threat Actor Groups * Tags: * AWS * AWS credential stealing * Bling Libra * Extortion * MITRE * S3 * ShinyHunters * * Share * * * * * * * EXECUTIVE SUMMARY In an incident response engagement handled by Unit 42, the threat actor group Bling Libra (the group behind the ShinyHunters ransomware) showcased their new shift to extorting victims rather than their traditional tactic of selling/publishing stolen data. This engagement also displayed how the group acquires legitimate credentials, sourced from public repositories, to gain initial access to an organization’s Amazon Web Services (AWS) environment. While the permissions associated with the compromised credentials limited the impact of the breach, Bling Libra infiltrated the organization’s AWS environment and conducted reconnaissance operations. The threat actor group used tools such as the Amazon Simple Storage Service (S3) Browser and WinSCP to gather information on S3 bucket configurations, access S3 objects and delete data. Threat actors commonly use S3 Browser and WinSCP during their attacks. To expand incident responders’ understanding of how these tools generate events in the logs, this research differentiates activity initiated by the threat actors versus activity automatically generated by each tool. As businesses increasingly embrace cloud technologies, the threat posed by groups like Bling Libra underscores the importance of robust cybersecurity practices. By implementing proactive security measures and monitoring critical log sources, organizations can effectively safeguard their cloud assets and mitigate the impact of cyberthreats. AWS log sources and services such as Amazon GuardDuty, AWS Config and AWS Security Hub play a crucial role in enhancing the security posture of organizations. When using AWS Organizations, using AWS Service Control Policies and permission boundaries add additional protection. These tools provide valuable insights and alerts to security analysts, enabling them to monitor and respond to security incidents effectively. Palo Alto Networks customers are better protected from the threats discussed above through the following products: * Cortex XDR for cloud can offer a comprehensive incident story by integrating activity from cloud hosts, cloud traffic and audit logs together with endpoint and network data. * Palo Alto Networks customers can also take advantage of Prisma Cloud to monitor posture and maintain compliance across public clouds. * Palo Alto Networks Cloud Security Agent (CSA) uses XSIAM to provide detection and monitoring capabilities to cloud infrastructure through both Prisma Cloud and Cortex cloud agents. If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team. Related Unit 42 Topics Extortion, Cloud Cybersecurity Research BLING LIBRA BACKGROUND: THE THREAT ACTORS BEHIND SHINYHUNTERS Unless a threat actor leaves specific indicators behind, researchers have a difficult time performing attribution for cloud attacks. However, the threat actor group Bling Libra does not hold back in making sure their attacks explicitly link back to them. Bling Libra first emerged in 2020 and has been linked to significant data breaches, such as the Microsoft GitHub and the Tokopedia attacks in 2020 as reported by Wired. While Bling Libra’s targets span various industries and geographic regions, their modus operandi remains consistent. This group typically acquires legitimate credentials before targeting database infrastructure to gather personally identifiable information (PII) for resale on underground marketplaces. In 2024, the group shifted from trying to sell data they’ve collected to extorting their victims, and targeting cloud environments. INTRODUCTION TO MITRE ATT&CK® FRAMEWORK This article uses the MITRE ATT&CK framework to categorize the different tactics present within the attack. The matrix comprises 14 unique tactics (Enterprise version 15) and categorizes various common characteristics seen by threat actors. For more information on the tactics present in this article, each header contains a link to each specific tactic and their corresponding techniques. Figure 1 represents the first step in the attack. Figure 1. Initial access begins with stealing AWS access keys. INITIAL ACCESS (TA0001) To gain initial access into the organization's AWS environment, the threat actors obtained AWS credentials from a sensitive file exposed on the internet. The file contained a variety of credentials, but the group specifically targeted the exposed AWS access key belonging to an identity and access management (IAM) user and a handful of other exposed credentials. These cloud credentials allowed the threat actors to gain access to the AWS account where this IAM user resided and perform AWS application program interface (API) calls. The permissions associated with these credentials only allowed the attackers to successfully interact with S3 with the AmazonS3FullAccess policy. This AWS-managed policy grants unlimited permissions to S3 resources within an AWS account depending on what other organizational policies the AWS account might employ. Unit 42 commonly investigates matters where overly permissive cloud credentials deployed by organizations lead to further exploitation of an environment. This Bling Libra attack exemplifies the results of not following the principle of least privilege. DISCOVERY (TA0007) Once Bling Libra gained access to the organization’s AWS environment, they performed a variety of API calls to determine the extent of the permissions the compromised credentials contained. To determine what API calls the threat actors made, Unit 42 used CloudTrail logs to track the group’s activities in the environment. CloudTrail logs all the management events that occur within an AWS account. Figure 2 captures the various discovery attempts. Figure 2. Discovery begins the attacker’s process of learning more about the environment. Against the IAM service, the threat actor performed ListUsers, which returns a list of the existing users within the AWS account. Due to the limited permissions associated with the access key, the API call failed. To learn more about the S3 buckets that existed within the AWS account, the group performed the ListBuckets API call using the AWS Command Line Interface (CLI). The AWS CLI provides people the ability to interact with an AWS account through the command line, and it provides the building blocks for automation. From there, the threat actors switched to using the S3 Browser tool to iterate through the S3 buckets in the account and that generated both GetBucketLocation and GetBucketObjectLockConfiguration events in the CloudTrail logs. The S3 Browser tools provide a graphical user interface (GUI) to interact with the S3 buckets within an AWS account. The S3 Browser analysis section discusses in more depth which API calls the tool automatically generates to help incident responders differentiate between tool automation and threat actor activity. DATA ACCESS AND IMPACT (TA0010 AND TA0040) Following the discovery operations, the threat actor waited almost a month before returning and taking disruptive actions within the organization’s AWS account. Due to both CloudTrail S3 data logging and S3 server access logging not being enabled within the organization's AWS environment, no logs existed that showed exfiltration activity from the S3 buckets. Figure 3 illustrates the next two stages of the attack. Figure 3. Data access and impact of the attacker's actions. After waiting that extended period of time, the threat actor group used WinSCP to graphically view all the S3 buckets in the account. After selecting the Amazon S3 file protocol and entering the access key ID and secret access key, the tool automatically generates the ListBuckets API call to populate the list of buckets in the GUI. Due to the lack of object level logging, no other API calls appeared in the CloudTrail logs until the threat actor deleted a handful of buckets, which resulted in the DeleteBucket API call. As described below, WinSCP provides various methods to interact with the S3 storage objects in an AWS account. The ransom note later sent by the threat actor provided proof of data access, but it did not provide enough specifics to determine what S3 data left the environment. EXECUTION (TA0002) Following the deletion of all the S3 buckets, the threat actor used an automated script with the AWS CLI and attempted to create new S3 buckets. These buckets had various name variations of contact-shinycorp-tutanota-com-# with the # replaced with ascending numbers. Figure 4 shows the final step – execution of the script. Figure 4. The attacker creates new S3 buckets. All the buckets were created within ten minutes of starting the CreateBucket operations. We see no motive behind creating these S3 buckets other than to mock the organization about the attack. Figure 5 shows the full MITRE timeline based on key events detailed above. Figure 5. The MITRE timeline details the attack path taken by the threat actor. EXTORTION After Bling Libra performed all the aforementioned actions (i.e., data access via API key, discovery, deletion and creation of buckets), they completed their attack by sending an extortion email to the victim organization. The note stated the group had shifted to extortion to make more money and that the victim organization had one week to pay, as seen in Figure 6. Figure 6. Extortion email. S3 BROWSER AND WINSCP ANALYSIS In many Unit 42 investigations involving cloud compromises, S3 Browser and WinSCP appear in the logs as threat actors use them for nefarious activity. Unit 42 performed tests to determine which activity in the AWS CloudTrail logs came from specific actions taken in the tools’ GUIs versus automation API calls performed by the tools themselves. The following tests used S3 Browser version 11.6.7 and WinSCP version 5.21.7.0. S3 BROWSER Unit 42 performed tests to understand which API calls automatically happen in the background by the tool, and which API calls get logged because of specific actions performed by a user in the GUI. The API calls can be tracked via the user agent field in the CloudTrail logs, which would contain a value of S3 Browser/<Version> (https://s3browser[.]com). The test activities we discuss here took place against a bucket we created with data events logging enabled in CloudTrail, to compare the visibility in management versus data events. Data events provide visibility into the resource operations performed on or within a resource (e.g., creating, downloading or deleting an object within the S3 buckets). We denote object-level logging events with an asterisk (*) in the following sections. * The first connection to the S3 storage service after entering the access key credentials resulted in the API calls listed below. As noted in Figures 7 and 8, S3 Browser automatically queries the object list, location and object lock configuration for the first S3 bucket alphabetically. If the S3 Browser application stays open when adding and removing the access key, only ListBuckets and ListDistributions appear in the CloudTrail logs (shown in Figures 9 and 10): * ListBuckets * ListObjects* * GetBucketLocation * GetBucketObjectLockConfiguration * ListDistributions Figure 7. First connection to S3 service using S3 Browser. Figure 8. API calls for first connection to S3 service using S3 Browser. Figure 9. Connection using the same API keys without closing the S3 Browser. Figure 10. API calls for the connection using the same API keys without closing the S3 Browser. * When selecting and viewing the directory structure of another bucket in S3 Browser, it results in the following API calls. * ListObjects* * GetBucketLocation * GetBucketObjectLockConfiguration * When previewing an object in S3 Browser (shown in Figure 11), the previewed file gets downloaded as a temporary file locally onto the host running the S3 Browser application. The file then immediately gets deleted from disk (even if the preview window is still open with the file in the GUI). The S3 Browser stores the file in a temporary directory: C:\Users\<username>\AppData\Local\Temp\S3 Browser\<TempFileName>. The CloudTrail logs generate two data events for this action, one of them being GetObject, which appears in the logs since the object retrieval took place to populate the preview window. The HeadObject API call retrieves metadata about the object selected (e.g., its size, last modified date and metadata displayed by the application in the Properties tab). * HeadObject* * GetObject* * C:\Users\<username>\AppData\Local\Temp\S3 Browser\<TempFileName> Figure 11. Previewing an object in S3 Browser. * Creating and deleting buckets and objects resulted in Put, Create and Delete API calls as listed below: * DeleteObject* * PutObject* * CreateBucket * DeleteBucket * Viewing the permissions in S3 Browser (shown in Figure 12) results in the API calls below for the access control list (ACL), OwnershipControls and PublicAccessBlock of the currently selected bucket. * GetBucketAcl * GetBucketOwnershipControls * GetBucketPublicAccessBlock Figure 12. Viewing the permissions of the bucket. * Viewing the properties (shown in Figure 13) will result in multiple API calls to gather information about all the properties related to the bucket to populate all the information in the Preview window. * GetBucketLogging * GetBucketObjectLockConfiguration * GetBucketReplication * GetBucketVersioning * GetAccelerateConfiguration* * GetBucketRequestPayment Figure 13. Viewing properties of a bucket in S3 Browser. * Attempting to enable and disable versioning for the bucket (shown in Figure 14) results in the API calls below, which first gather the versioning state and then set it to the required value. * GetBucketVersioning * PutBucketVersioning with request parameter showing the status as shown in Figure 15 Figure 14. Attempting to modify the versioning properties. Figure 15. Request Parameters of the API call when enabling the versioning for bucket. * Attempting to disable public block access for the bucket (shown in Figure 16) results in the API calls below, which first gather the public access block configuration and then attempts to remove it. * GetBucketPublicAccessBlock * DeleteBucketPublicAccessBlock * PutBucketAcl Figure 16. Attempting to modify the public access block configuration. WINSCP Windows Secure Copy, commonly known as WinSCP, is a popular file transfer application primarily used for transferring files between local and remote systems using various protocols such as SFTP, SCP, FTPS and FTP. While not specifically designed for Amazon S3, WinSCP can be configured to interact with S3 buckets. While WinSCP provides versatile file transfer capabilities, it does not offer dedicated features for managing Amazon S3 storage, such as advanced bucket and object management functionalities found in S3 Browser. Unit 42 tested to understand what API calls are automatically made when performing specific actions. WinSCP API calls can be tracked via the user agent field in the CloudTrail logs: WinSCP/<version>. These test activities took place against a bucket we created with data events logging enabled in CloudTrail to compare the visibility in management versus data events. * The first connection to the S3 storage service after entering the access key credentials (shown in Figure 17) results in the API call below to list all the buckets in the GUI: * ListBuckets Figure 17. Connection to S3 using WinSCP. * Viewing the properties of an object will result in an API call that returns metadata about the object such as location, size, owner, ACL as shown in Figure 18. * GetObjectAcl* Figure 18. Viewing the properties of an object in WinSCP. * Downloading, deleting and creating objects and buckets generated the API calls below. * GetObject* * DeleteObject* * PutObject* * CreateBucket * DeleteBucket When comparing the two tools, S3 Browser generates a lot more API calls that automatically appear in the CloudTrail logs based on user interaction, compared to WinSCP. The difference in the events generated in the CloudTrail logs comes down to the purpose of the two tools. Being a cloud native tool, S3 Browser takes advantage of more AWS features that generate additional API calls versus WinSCP, which works for more file transfer types than solely S3. Figure 19 shows the entire attack broken down based on API calls to display the various results from each tool used. Figure 19. API call-delineated attack chain. CONCLUSION As organizations increasingly migrate their critical operations to the cloud, we continuously witness a concerning trend of overly permissive credentials. Threat actors like Bling Libra have evolved their tactics to exploit misconfigurations and exposed credentials in cloud environments. Due to limited permissions of the compromised access keys, the breach covered in this post did not have an impact past the S3 buckets. However, in the past, Unit 42 has observed threat actors abusing overly permissive credentials to create resources for malicious use or modifying the IAM users and permissions to maintain persistence within an environment. Use IAM Access Analyzer to better identify and manage access risks by analyzing resource policies. Additionally, when using AWS Organizations, AWS Service Control Policies and permission boundaries can be used to help ensure that only permitted actions are allowed, regardless of the individual IAM policies within each account. Figure 20 shows the complete attack path taken by the threat actor as grouped by MITRE tactics. Figure 20. The MITRE timeline details the attack path taken by the threat actor. Ensuring appropriately configured security configurations lays the groundwork to better protect organizations against potential breaches and data compromises. In this attack, attaching an S3 bucket policy requiring MFA to perform sensitive API calls such as DeleteBucket would have provided additional layers of protection against data loss. For critical data, we recommend replicating the data into another region or account to help ensure availability and resilience against security breaches including data destruction. Ensuring adequate protection also involves regularly auditing and updating access controls, encryption settings and network configurations to align with best practices and compliance requirements. Leveraging services like AWS Config and AWS Security Hub provides continuous monitoring and assessment of the AWS environment's security posture. Additionally, comprehending the attack lifecycle and the tactics, techniques and procedures (TTPs) of threat actors allows defenders to build the proper understanding for safeguarding cloud environments. By understanding how adversaries operate and the stages they go through to achieve their objectives, security analysts can proactively configure and monitor the necessary log sources in AWS . This allows defenders to more effectively detect and respond to cloud threats. Additionally, integrating Amazon GuardDuty for threat detection further strengthens security postures. Palo Alto Networks customers are better protected from the threats discussed above through the following products: * Cortex XDR for cloud can offer a comprehensive incident story by integrating activity from cloud hosts, cloud traffic and audit logs together with endpoint and network data. * Palo Alto Networks’ customers can also take advantage of Prisma Cloud to monitor posture and maintain compliance across public clouds. * Palo Alto Networks’ Cloud Security Agent (CSA) uses XSIAM to provide improved security posture and further enable detection and runtime monitoring capabilities to critical cloud infrastructure through both Prisma Cloud and Cortex cloud agents. If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team or call: * North America Toll-Free: 866.486.4842 (866.4.UNIT42) * EMEA: +31.20.299.3130 * APAC: +65.6983.8730 * Japan: +81.50.1790.0200 Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance. IOCS Threat actor email address * shinycorp@tutonota[.]com User Agents (X stands for varying version numbers) * S3 Browser/X.X.X (https://s3browser.com) * WinSCP/X.X.X neon/X.X.X * aws-cli/X.X.X Python/X.X.X Linux/X.X.X-aws botocore/X.X.X * aws-cli/X.X.X md/Botocore#X.X.X ua/X.X os/linux#X.X.X-aws md/arch#x86_64 lang/python#X.X.X md/pyimpl#CPython cfg/retry-mode#legacy botocore/X.X.X * aws-cli/X.X.X md/Botocore#X.X.X md/awscrt#X.X.X ua/2.0 os/linux#X.X.X md/arch#x86_64 lang/python#X.X.X md/pyimpl#CPython cfg/retry-mode#legacy botocore/X.X.X ADDITIONAL RESOURCES * How to guard against ShinyHunters – Intel471 * ShinyHunters on a Data Breach Spree – Wired * Member of hacking crew sentenced to prison – United States Attorney’s Office * ‘ShinyHunters’ Group Claims Massive Ticketmaster Breach – Information Week * ShinyHunters claims Santander breach, selling data for 30M customers – Bleeping Computer * Dark Web Profile : ShinyHunters – SOCRadar * S3 Browser Documentation – S3 Browser * Connecting to AWS S3 via WinSCP – WinSCP Updated Aug. 29, 2024, at 12:35 p.m. PT to clarify product protections section. Back to top TAGS * AWS * AWS credential stealing * Bling Libra * Extortion * MITRE * S3 * ShinyHunters Threat Research Center Next: Autoencoder Is All You Need: Profiling and Detecting Malicious DNS Traffic TABLE OF CONTENTS * * Executive Summary * Bling Libra Background: The Threat Actors Behind ShinyHunters * Introduction to MITRE ATT&CK® Framework * Initial Access (TA0001) * Discovery (TA0007) * Data Access and Impact (TA0010 and TA0040) * Execution (TA0002) * Extortion * S3 Browser and WinSCP Analysis * S3 Browser * WinSCP * Conclusion * IoCs * Additional Resources RELATED ARTICLES * Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomware * TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Toolkit * Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy RELATED RESOURCES Threat Research August 13, 2024 ARTIPACKED: HACKING GIANTS THROUGH A RACE CONDITION IN GITHUB ACTIONS ARTIFACTS * Artifacts * AWS * GitHub Read now Trend Reports August 9, 2024 RANSOMWARE REVIEW: FIRST HALF OF 2024 * Healthcare * LockBit * RansomHub Read now Threat Research July 22, 2024 FROM RA GROUP TO RA WORLD: EVOLUTION OF A RANSOMWARE GROUP * Extortion * Leak site * Babuk Read now High Profile Threats November 20, 2024 THREAT ASSESSMENT: IGNOBLE SCORPIUS, DISTRIBUTORS OF BLACKSUIT RANSOMWARE * BlackSuit ransomware * Construction * Education Read now Threat Research November 12, 2024 MODELEAK: PRIVILEGE ESCALATION TO LLM MODEL EXFILTRATION IN VERTEX AI * Data exfiltration * Google Cloud * Kubernetes Read now Threat Actor Groups October 30, 2024 JUMPY PISCES ENGAGES IN PLAY RANSOMWARE * North Korea * Jumpy Pisces * Fiddling Scorpius Read now High Profile Threats October 10, 2024 LYNX RANSOMWARE: A REBRANDING OF INC RANSOMWARE * Leak site * Double extortion Read now High Profile Threats September 10, 2024 THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE * RaaS * Data exfiltration * Leak site Read now Threat Research August 15, 2024 LEAKED ENVIRONMENT VARIABLES ALLOW LARGE-SCALE EXTORTION OPERATION IN CLOUD ENVIRONMENTS * Credential theft * Extortion * MITRE Read now Threat Research August 13, 2024 ARTIPACKED: HACKING GIANTS THROUGH A RACE CONDITION IN GITHUB ACTIONS ARTIFACTS * Artifacts * AWS * GitHub Read now Trend Reports August 9, 2024 RANSOMWARE REVIEW: FIRST HALF OF 2024 * Healthcare * LockBit * RansomHub Read now Threat Research July 22, 2024 FROM RA GROUP TO RA WORLD: EVOLUTION OF A RANSOMWARE GROUP * Extortion * Leak site * Babuk Read now High Profile Threats November 20, 2024 THREAT ASSESSMENT: IGNOBLE SCORPIUS, DISTRIBUTORS OF BLACKSUIT RANSOMWARE * BlackSuit ransomware * Construction * Education Read now Threat Research November 12, 2024 MODELEAK: PRIVILEGE ESCALATION TO LLM MODEL EXFILTRATION IN VERTEX AI * Data exfiltration * Google Cloud * Kubernetes Read now Threat Actor Groups October 30, 2024 JUMPY PISCES ENGAGES IN PLAY RANSOMWARE * North Korea * Jumpy Pisces * Fiddling Scorpius Read now High Profile Threats October 10, 2024 LYNX RANSOMWARE: A REBRANDING OF INC RANSOMWARE * Leak site * Double extortion Read now High Profile Threats September 10, 2024 THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE * RaaS * Data exfiltration * Leak site Read now Threat Research August 15, 2024 LEAKED ENVIRONMENT VARIABLES ALLOW LARGE-SCALE EXTORTION OPERATION IN CLOUD ENVIRONMENTS * Credential theft * Extortion * MITRE Read now Threat Research August 13, 2024 ARTIPACKED: HACKING GIANTS THROUGH A RACE CONDITION IN GITHUB ACTIONS ARTIFACTS * Artifacts * AWS * GitHub Read now Trend Reports August 9, 2024 RANSOMWARE REVIEW: FIRST HALF OF 2024 * Healthcare * LockBit * RansomHub Read now Threat Research July 22, 2024 FROM RA GROUP TO RA WORLD: EVOLUTION OF A RANSOMWARE GROUP * Extortion * Leak site * Babuk Read now * * Get updates from Unit 42 PEACE OF MIND COMES FROM STAYING AHEAD OF THREATS. CONTACT US TODAY. Your Email Subscribe for email updates to all Unit 42 threat research. By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Invalid captcha! Subscribe PRODUCTS AND SERVICES * Network Security Platform * CLOUD DELIVERED SECURITY SERVICES * Advanced Threat Prevention * DNS Security * Data Loss Prevention * IoT Security * Next-Generation Firewalls * Hardware Firewalls * Strata Cloud Manager * SECURE ACCESS SERVICE EDGE * Prisma Access * Prisma SD-WAN * Autonomous Digital Experience Management * Cloud Access Security Broker * Zero Trust Network Access * Code to Cloud Platform * Prisma Cloud * Cloud-Native Application Protection Platform * AI-Driven Security Operations Platform * Cortex XDR * Cortex XSOAR * Cortex Xpanse * Cortex XSIAM * External Attack Surface Protection * Security Automation * Threat Prevention, Detection & Response * Threat Intel and Incident Response Services * Proactive Assessments * Incident Response * Transform Your Security Strategy * Discover Threat Intelligence COMPANY * About Us * Careers * Contact Us * Corporate Responsibility * Customers * Investor Relations * Location * Newsroom POPULAR LINKS * Blog * Communities * Content Library * Cyberpedia * Event Center * Manage Email Preferences * Products A-Z * Product Certifications * Report a Vulnerability * Sitemap * Tech Docs * Unit 42 * Do Not Sell or Share My Personal Information * Privacy * Trust Center * Terms of Use * Documents Copyright © 2024 Palo Alto Networks. All Rights Reserved * * * * * EN * Select your language * USA (ENGLISH) Your browser does not support the video tag. DEFAULT HEADING Read the article Seekbar Volume This site uses cookies essential to its operation, for analytics, and for personalized content and ads. Please read our privacy statement for more information.Privacy statement Cookies Settings Reject All Accept All Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information on cookie consent Allow All MANAGE YOUR CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices