Description

Cybercriminals have unleashed an upgraded version of the notorious GhostLocker ransomware, dubbed GhostLocker 2.0, in a series of attacks across the Middle East, Africa, and Asia. Joint efforts by ransomware groups GhostSec and Stormous have resulted in a surge of double-extortion ransomware assaults targeting organizations in various sectors, including technology, universities, manufacturing, transportation, and government entities. The ransomware operations coerce victims into paying for decryption keys to regain access to encrypted data and threaten to leak sensitive information unless hush money is paid. Both GhostSec and Stormous have introduced a revised ransomware-as-a-service (RaaS) program named STMX_GhostLocker, offering diverse options for affiliates. GhostSec's targets include Israel's industrial systems and critical infrastructure, with reports indicating attacks on the Israeli Ministry of Defense. Although primarily driven by profit motives, the group's affiliation with the Ghost Security Group, known for hacktivist activities, raises questions about their true intentions. Stormous has expanded its ransomware operations, integrating GhostLocker into its existing program after a successful joint operation against Cuban ministries in July 2023. The group is suspected of conducting attacks on corporate websites, utilizing tools like GhostPresser and XSS attacks. The latest GhostLocker iteration, coded in GoLang, features enhanced encryption and a seven-day deadline for victims to contact ransomware operators before data leaks occur. Affiliates gain access to a control panel for monitoring attacks, with the command-and-control server traced to Moscow. To defend against these attacks, Cisco advises implementing defense-in-depth security measures, updating detection signatures, and isolating public-facing systems with demilitarized zones (DMZs). However, the extent of the attacks' success remains uncertain, with limited data available on impacted victims and payments made.