Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

INC Ransom

INC Ransom is a ransomware and data extortion threat group associated with the deployment of INC Ransomware that has been active since at least July 2023. INC Ransom has targeted organizations worldwide most commonly in the industrial, healthcare, and education sectors in the US and Europe.(Citation: Bleeping Computer INC Ransomware March 2024)(Citation: Cybereason INC Ransomware November 2023)(Citation: Secureworks GOLD IONIC April 2024)(Citation: SentinelOne INC Ransomware)
ID: G1032
Associated Groups: GOLD IONIC
Created: 06 Jun 2024
Last Modified: 28 Oct 2024

Associated Group Descriptions

Name Description
GOLD IONIC (Citation: Secureworks GOLD IONIC April 2024)

Techniques Used

Domain ID Name Use
Enterprise T1087 .002 Account Discovery: Domain Account

INC Ransom has scanned for domain admin accounts in compromised environments.(Citation: SOCRadar INC Ransom January 2024)

Enterprise T1560 .001 Archive Collected Data: Archive via Utility

INC Ransom has used 7-Zip and WinRAR to archive collected data prior to exfiltration.(Citation: Huntress INC Ransom Group August 2023)(Citation: Secureworks GOLD IONIC April 2024)(Citation: SOCRadar INC Ransom January 2024)(Citation: Huntress INC Ransomware May 2024)

Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

INC Ransom has used `cmd.exe` to launch malicious payloads.(Citation: Huntress INC Ransom Group August 2023)

Enterprise T1562 .001 Impair Defenses: Disable or Modify Tools

INC Ransom can use SystemSettingsAdminFlows.exe, a native Windows utility, to disable Windows Defender.(Citation: Huntress INC Ransomware May 2024)

Enterprise T1070 .004 Indicator Removal: File Deletion

INC Ransom has uninstalled tools from compromised endpoints after use.(Citation: Huntress INC Ransomware May 2024)

Enterprise T1036 .005 Masquerading: Match Legitimate Name or Location

INC Ransom has named a PsExec executable winupd to mimic a legitimate Windows update file.(Citation: Huntress INC Ransom Group August 2023)(Citation: SOCRadar INC Ransom January 2024)

Enterprise T1588 .002 Obtain Capabilities: Tool

INC Ransom has acquired and used several tools including MegaSync, AnyDesk, esentutl and PsExec.(Citation: Cybereason INC Ransomware November 2023)(Citation: Huntress INC Ransom Group August 2023)(Citation: SOCRadar INC Ransom January 2024)(Citation: Huntress INC Ransomware May 2024)(Citation: SentinelOne INC Ransomware)

Enterprise T1069 .002 Permission Groups Discovery: Domain Groups

INC Ransom has enumerated domain groups on targeted hosts.(Citation: Huntress INC Ransom Group August 2023)

Enterprise T1021 .001 Remote Services: Remote Desktop Protocol

INC Ransom has used RDP to move laterally.(Citation: Cybereason INC Ransomware November 2023)(Citation: Huntress INC Ransom Group August 2023)(Citation: SOCRadar INC Ransom January 2024)(Citation: Huntress INC Ransomware May 2024)

Enterprise T1569 .002 System Services: Service Execution

INC Ransom has run a file encryption executable via `Service Control Manager/7045;winupd,%SystemRoot%\winupd.exe,user mode service,demand start,LocalSystem`.(Citation: Huntress INC Ransom Group August 2023)

Software

ID Name References Techniques
S0039 Net (Citation: Huntress INC Ransomware May 2024) (Citation: Microsoft Net Utility) (Citation: Savill 1999) Password Policy Discovery, Domain Groups, System Time Discovery, Domain Account, Local Account, System Service Discovery, Remote System Discovery, Network Share Discovery, System Network Connections Discovery, Network Share Connection Removal, Service Execution, Local Account, Additional Local or Domain Groups, Local Groups, SMB/Windows Admin Shares, Domain Account
S1040 Rclone (Citation: DarkSide Ransomware Gang) (Citation: Detecting Rclone) (Citation: DFIR Conti Bazar Nov 2021) (Citation: Huntress INC Ransomware May 2024) (Citation: Rclone Wars) (Citation: Rclone) Exfiltration to Cloud Storage, File and Directory Discovery, Data Transfer Size Limits, Archive via Utility, Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, Exfiltration Over Unencrypted Non-C2 Protocol
S0359 Nltest (Citation: Huntress INC Ransom Group August 2023) (Citation: Nltest Manual) Domain Trust Discovery, Remote System Discovery, System Network Configuration Discovery
S0404 esentutl (Citation: Microsoft Esentutl) (Citation: SentinelOne INC Ransomware) (Citation: SOCRadar INC Ransom January 2024) Direct Volume Access, Lateral Tool Transfer, NTDS, NTFS File Attributes, Ingress Tool Transfer, Data from Local System
S0183 Tor (Citation: Dingledine Tor The Second-Generation Onion Router) (Citation: Secureworks GOLD IONIC April 2024) (Citation: SentinelOne INC Ransomware) (Citation: SOCRadar INC Ransom January 2024) Asymmetric Cryptography, Multi-hop Proxy
S1139 INC Ransomware (Citation: Cybereason INC Ransomware November 2023) (Citation: Huntress INC Ransom Group August 2023) (Citation: Secureworks GOLD IONIC April 2024) (Citation: SentinelOne INC Ransomware) Peripheral Device Discovery, Lateral Tool Transfer, Phishing, Native API, Device Driver Discovery, Inhibit System Recovery, Windows Management Instrumentation, System Information Discovery, Network Share Discovery, Data Encrypted for Impact, Deobfuscate/Decode Files or Information, File and Directory Discovery, Process Discovery, Service Stop, Internal Defacement
S0552 AdFind (Citation: FireEye FIN6 Apr 2019) (Citation: FireEye Ryuk and Trickbot January 2019) (Citation: Red Canary Hospital Thwarted Ryuk October 2020) (Citation: Secureworks GOLD IONIC April 2024) Domain Trust Discovery, Domain Groups, System Network Configuration Discovery, Remote System Discovery, Domain Account
S0029 PsExec (Citation: Cybereason INC Ransomware November 2023) (Citation: Huntress INC Ransom Group August 2023) (Citation: Russinovich Sysinternals) (Citation: SANS PsExec) (Citation: Secureworks GOLD IONIC April 2024) (Citation: SOCRadar INC Ransom January 2024) SMB/Windows Admin Shares, Windows Service, Lateral Tool Transfer, Service Execution, Domain Account

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.