{"id":123640,"date":"2022-10-14T12:00:00","date_gmt":"2022-10-14T19:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=123640"},"modified":"2023-10-13T07:12:57","modified_gmt":"2023-10-13T14:12:57","slug":"new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/14\/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland\/","title":{"rendered":"New \u201cPrestige\u201d ransomware impacts organizations in Ukraine and Poland"},"content":{"rendered":"\n
\n

April 2023 update<\/strong> \u2013 Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. IRIDIUM<\/strong> is now tracked as Seashell Blizzard<\/strong>. <\/p>\n\n\n\n

To learn about how the new taxonomy represents the origin, unique traits, and impact of threat actors, and to get a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming taxonomy<\/strong><\/a>.<\/p>\n\n\n\n

November 10, 2022 update:<\/strong> MSTIC has updated this blog to document assessed attribution of DEV-0960 as IRIDIUM, the actor that executed the Prestige ransomware-style attacks.<\/p>\n<\/blockquote>\n\n\n\n

The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the transportation and related logistics industries in Ukraine and Poland utilizing a previously unidentified ransomware payload. We observed this new ransomware, which labels itself in its ransom note as \u201cPrestige ranusomeware\u201d, being deployed on October 11 in attacks occurring within an hour of each other across all victims.<\/p>\n\n\n\n

Attribution to IRIDIUM<\/h2>\n\n\n\n

As of November 2022, MSTIC assesses that IRIDIUM very likely executed the Prestige ransomware-style attack. IRIDIUM is a Russia-based threat actor tracked by Microsoft, publicly overlapping with Sandworm, that has been consistently active in the war in Ukraine and has been linked to destructive attacks since the start of the war. This attribution assessment is based on forensic artifacts, as well as overlaps in victimology, tradecraft, capabilities, and infrastructure, with known IRIDIUM activity. Review of technical artifacts available to Microsoft links IRIDIUM to interactive compromise activity at multiple Prestige victims as far back as March 2022 and continuing within the week leading up to the October 2022 attack discussed in the blog below.<\/p>\n\n\n\n

The Prestige campaign may highlight a measured shift in IRIDIUM\u2019s destructive attack calculus, signaling increased risk to organizations directly supplying or transporting humanitarian or military assistance to Ukraine. More broadly, it may represent an increased risk to organizations in Eastern Europe that may be considered by the Russian state to be providing support relating to the war.<\/p>\n\n\n\n

Microsoft would like to acknowledge CERT UA for their cooperation and information sharing to assist in our investigations. CERT UA continues to demonstrate incredible resolve and commitment to security despite physical danger.<\/p>\n\n\n\n

Observed actor activity<\/h2>\n\n\n\n

This ransomware campaign had several notable features that differentiate it from other Microsoft-tracked ransomware campaigns:<\/p>\n\n\n\n