{"id":123640,"date":"2022-10-14T12:00:00","date_gmt":"2022-10-14T19:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=123640"},"modified":"2023-10-13T07:12:57","modified_gmt":"2023-10-13T14:12:57","slug":"new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/14\/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland\/","title":{"rendered":"New \u201cPrestige\u201d ransomware impacts organizations in Ukraine and Poland"},"content":{"rendered":"\n
\nApril 2023 update<\/strong> \u2013 Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. IRIDIUM<\/strong> is now tracked as Seashell Blizzard<\/strong>. <\/p>\n\n\n\n
To learn about how the new taxonomy represents the origin, unique traits, and impact of threat actors, and to get a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming taxonomy<\/strong><\/a>.<\/p>\n\n\n\n
November 10, 2022 update:<\/strong> MSTIC has updated this blog to document assessed attribution of DEV-0960 as IRIDIUM, the actor that executed the Prestige ransomware-style attacks.<\/p>\n<\/blockquote>\n\n\n\n
The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the transportation and related logistics industries in Ukraine and Poland utilizing a previously unidentified ransomware payload. We observed this new ransomware, which labels itself in its ransom note as \u201cPrestige ranusomeware\u201d, being deployed on October 11 in attacks occurring within an hour of each other across all victims.<\/p>\n\n\n\n
Attribution to IRIDIUM<\/h2>\n\n\n\n
As of November 2022, MSTIC assesses that IRIDIUM very likely executed the Prestige ransomware-style attack. IRIDIUM is a Russia-based threat actor tracked by Microsoft, publicly overlapping with Sandworm, that has been consistently active in the war in Ukraine and has been linked to destructive attacks since the start of the war. This attribution assessment is based on forensic artifacts, as well as overlaps in victimology, tradecraft, capabilities, and infrastructure, with known IRIDIUM activity. Review of technical artifacts available to Microsoft links IRIDIUM to interactive compromise activity at multiple Prestige victims as far back as March 2022 and continuing within the week leading up to the October 2022 attack discussed in the blog below.<\/p>\n\n\n\n
The Prestige campaign may highlight a measured shift in IRIDIUM\u2019s destructive attack calculus, signaling increased risk to organizations directly supplying or transporting humanitarian or military assistance to Ukraine. More broadly, it may represent an increased risk to organizations in Eastern Europe that may be considered by the Russian state to be providing support relating to the war.<\/p>\n\n\n\n
Microsoft would like to acknowledge CERT UA for their cooperation and information sharing to assist in our investigations. CERT UA continues to demonstrate incredible resolve and commitment to security despite physical danger.<\/p>\n\n\n\n
Observed actor activity<\/h2>\n\n\n\n
This ransomware campaign had several notable features that differentiate it from other Microsoft-tracked ransomware campaigns:<\/p>\n\n\n\n
\n
- The enterprise-wide deployment of ransomware is not common in Ukraine, and this activity was not connected to any of the 94 currently active ransomware activity groups that Microsoft tracks<\/li>\n\n\n\n
- The Prestige ransomware had not been observed by Microsoft prior to this deployment<\/li>\n\n\n\n
- The activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)<\/li>\n<\/ul>\n\n\n\n
Despite using similar deployment techniques, the campaign is distinct from recent destructive attacks leveraging AprilAxe (ArguePatch)\/CaddyWiper or Foxblade (HermeticWiper) that have impacted multiple critical infrastructure organizations in Ukraine over the last two weeks. MSTIC has not yet linked this ransomware campaign to a known threat group and is continuing investigations. MSTIC is tracking this activity as IRIDIUM.<\/p>\n\n\n\n
This blog aims to provide awareness and indicators of compromise (IOCs) to Microsoft customers and the larger security community. Microsoft continues to monitor this and is in the process of early notification to customers impacted by IRIDIUM but not yet ransomed. MSTIC is also actively working with the broader security community and other strategic partners to share information that can help address this evolving threat through multiple channels.<\/p>\n\n\n\n
Pre-ransomware activities<\/h3>\n\n\n\n
Prior to deploying ransomware, the IRIDIUM activity included the use of the following two remote execution utilities:<\/p>\n\n\n\n
\n
- RemoteExec \u2013 a commercially available tool for agentless remote code execution<\/li>\n\n\n\n
- Impacket WMIexec \u2013 an open-source script-based solution for remote code execution<\/li>\n<\/ul>\n\n\n\n
To gain access to highly privileged credentials, in some of the environments, IRIDIUM used these tools for privilege escalation and credential extraction:<\/p>\n\n\n\n
\n
- winPEAS \u2013 an open-source collection of scripts to perform privilege escalation on Windows<\/li>\n\n\n\n
- comsvcs.dll<\/a> \u2013 used to dump the memory of the LSASS process and steal credentials<\/li>\n\n\n\n
- ntdsutil.exe \u2013 used to back up the Active Directory database, likely for later use credentials<\/li>\n<\/ul>\n\n\n\n
Ransomware deployment<\/h3>\n\n\n\n
In all observed deployments, the attacker had already gained access to highly privileged credentials, like Domain Admin, to facilitate the ransomware deployment. Initial access vector has not been identified at this time, but in some instances it\u2019s possible that the attacker might have already had existing access to the highly privileged credentials from a prior compromise. In these instances, the attack timeline starts with the attacker already having Domain Admin-level access and staging their ransomware payload.<\/p>\n\n\n\n
Most ransomware operators develop a preferred set of tradecraft for their payload deployment and execution, and this tradecraft tends to be consistent across victims, unless a security configuration prevents their preferred method. For this IRIDIUM activity, the methods used to deploy the ransomware varied across the victim environments, but it does not appear to be due to security configurations preventing the attacker from using the same techniques. This is especially notable as the ransomware deployments all occurred within one hour. The distinct methods for ransomware deployment were:<\/p>\n\n\n\n
\n
- Method 1: <\/strong>The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely create a Windows Scheduled Task on target systems to execute the payload<\/li>\n<\/ul>\n\n\n\n
<\/figure>\n\n\n\n\n
- Method 2:<\/strong> The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely invoke an encoded PowerShell command on target systems to execute the payload<\/li>\n<\/ul>\n\n\n\n
<\/figure>\n\n\n\n\n
- Method 3:<\/strong> The ransomware payload is copied to an Active Directory Domain Controller and deployed to systems using the Default Domain Group Policy Object<\/li>\n<\/ul>\n\n\n\n
<\/figure>\n\n\n\nMalware analysis<\/h3>\n\n\n\n
The \u201cPrestige\u201d ransomware requires administrative privileges to run. Like many ransomware payloads, it attempts to stop the MSSQL Windows service to ensure successful encryption using the following command (the strings \u201cC:\\Windows\\System32\\net.exe stop\u201d <\/em>and \u201cMSSQLSERVER\u201d <\/em>are both hardcoded in the analyzed samples):<\/p>\n\n\n\n
<\/figure>\n\n\n\nPrestige creates C:\\Users\\Public\\README <\/em>and stores the following ransom note in the file. The same file is also created in the root directory of each drive:<\/p>\n\n\n\n
Prestige ransom note<\/figcaption><\/figure>\n\n\n\n Prestige then traverses the files on the file system and encrypts the contents of files that have one of the following hardcoded file extensions, avoiding encrypting files in the C:\\Windows\\ <\/em>and C:\\ProgramData\\Microsoft\\<\/em> directories:<\/p>\n\n\n\n
<\/figure>\n\n\n\nAfter encrypting each file, the ransomware appends the extension .enc <\/em>to the existing extension of the file. For example, changes.txt <\/em>is encrypted and then renamed to changes.txt.enc<\/em>. Prestige uses the following two commands to register a custom file extension handler for files with .enc <\/em>file extension:<\/p>\n\n\n\n
<\/figure>\n\n\n\nCustom file extension handler for files with .enc <\/em>extension<\/figcaption><\/figure>\n\n\n\n As a result of creating the custom file extension handler, when any file carrying the file extension <\/span>.enc <\/em>(i.e., encrypted by Prestige) is opened by a user, the file extension handler uses Notepad to open <\/span>C:\\Users\\Public\\README<\/em>, which contains the ransom note.<\/span><\/p>\n\n\n\n
To encrypt files, Prestige leverages the CryptoPP C++ library to AES-encrypt each eligible file. During the encryption process, the following hardcoded RSA X509 public key is used by one version of the ransomware (each version of Prestige may carry a unique public key):<\/p>\n\n\n\n
<\/figure>\n\n\n\nTo hinder system and file recovery, Prestige runs the following command to delete the backup catalog from the system:<\/p>\n\n\n\n
<\/figure>\n\n\n\nPrestige also runs the following command to delete all volume shadow copies on the system:<\/p>\n\n\n\n
<\/figure>\n\n\n\nBefore running the commands above, the 32-bit version of Prestige calls the function Wow64DisableWow64FsRedirection()<\/a> to disable file system redirection and gain access to the native System32 directory. After running the commands above, Prestige restores file system redirection by calling the function Wow64RevertWow64FsRedirection()<\/a>.<\/p>\n\n\n\n
Microsoft will continue to monitor IRIDIUM activity and implement protections for our customers. The current detections, advanced detections, and IOCs in place across our security products are detailed below.<\/p>\n\n\n\n
Looking forward<\/h2>\n\n\n\n
The threat landscape in Ukraine continues to evolve, and wipers and destructive attacks have been a consistent theme. Ransomware and wiper attacks rely on many of the same security weaknesses to succeed. As the situation evolves, organizations can adopt the hardening guidance below to help build more robust defenses against these threats.<\/p>\n\n\n\n
Recommended customer actions<\/h2>\n\n\n\n
The ransomware payload was deployed by the actor after an initial compromise that involved gaining access to highly privileged credentials. The techniques used by the actor and described in the \u201cObserved Actor Activity\u201d section can be mitigated by adopting the security considerations provided below:<\/p>\n\n\n\n
\n
- Block process creations originating from PSExec and WMI commands<\/a> to stop lateral movement utilizing the WMIexec component of Impacket.<\/li>\n\n\n\n
- Enable Tamper protection<\/a> to prevent attacks from stopping or interfering with Microsoft Defender.<\/li>\n\n\n\n
- Turn on cloud-delivered protection<\/a> in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a huge majority of new and unknown variants.<\/li>\n\n\n\n
- While this attack differs from traditional ransomware, following our defending against ransomware<\/a> guidance helps protect against the credential theft, lateral movement, and ransomware deployment used by IRIDIUM.<\/li>\n\n\n\n
- Use the included indicators of compromise to investigate whether they exist in your environment and assess for potential intrusion.<\/li>\n\n\n\n
- Enable multifactor authentication (MFA)<\/a> to mitigate potentially compromised credentials and ensure that MFA is enforced for all remote connectivity, including VPNs. Microsoft strongly encourages all customers download and use password-less solutions like Microsoft Authenticator<\/a> to secure your accounts.<\/li>\n<\/ul>\n\n\n\n
Indicators of compromise (IOCs)<\/h2>\n\n\n\n
The following table lists the IOCs observed during our investigation. We encourage our customers to investigate these indicators in their environments and implement detections and protections to identify past related activity and prevent future attacks against their systems.<\/p>\n\n\n\n
Indicator<\/strong><\/td> Type<\/strong><\/td> Description<\/strong><\/td><\/tr> 5dd1ca0d471dee41eb3ea0b6ea117810f228354fc3b7b47400a812573d40d91d<\/td> SHA-256<\/td> Prestige ransomware payload<\/td><\/tr> 5fc44c7342b84f50f24758e39c8848b2f0991e8817ef5465844f5f2ff6085a57<\/td> SHA-256<\/td> Prestige ransomware payload<\/td><\/tr> 6cff0bbd62efe99f381e5cc0c4182b0fb7a9a34e4be9ce68ee6b0d0ea3eee39c<\/td> SHA-256<\/td> Prestige ransomware payload<\/td><\/tr> a32bbc5df4195de63ea06feb46cd6b55<\/td> Import hash<\/td> Unique PE Import Hash shared by ransomware payloads<\/td><\/tr> C:\\Users\\Public\\README<\/td> File path<\/td> File path of the ransom note<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n NOTE: <\/strong>These indicators should not be considered exhaustive for this observed activity.
<\/p>\n\n\n\nDetections<\/h2>\n\n\n\n
Microsoft 365 Defender<\/h3>\n\n\n\n
Microsoft Defender Antivirus<\/strong><\/p>\n\n\n\n
Microsoft Defender Antivirus detects known Prestige ransomware payloads with the following detection:<\/p>\n\n\n\n