Heimdal
article featured image

Contents:

In operation since 2020, the Makop ransomware gang is classified as a tier-B ransomware gang. The threat actor has successfully targeted companies in Europe and Italy with its hybrid arsenal of custom-developed and off-the-shelf software tools despite its low classification.

The Makop ransomware operators started their criminal business back in 2020, leveraging a new variant of the notorious Phobos ransomware. Even though the gang did not engage in double extortion during the last years, it maintained a solid presence in the criminal underground. The majority of the intrusion is handled by hands-on keyboard criminals, even during encryption.

Makop Ransomware

Detailed Findings

According to cyber security researcher Luca MellaMakop ransomware gang has been found to be using a set of custom-developed tools in their campaigns. Among them is a tool called ARestore that was built in 2020 and partially obfuscated.

View of the “ARestore” tool

Source

This tool generates comb lists of local Windows usernames and potential passwords and tests them locally. The APT use it after the initial access phase of their attack chain.

Additionaly, the operators leverage other custom .NET assemblies, PuffedUp for example, to achieve further stages of the kill chain.

This particular tool is designed to ensure persistence after the initial access. It relies on a textual configuration file placed in the same folder, containing one or more 42-character strings that will be placed into the user clipboard.

Furthermore, the ransomware gang is also using off-the-shelf open-source and freeware tools to conduct lateral movement and system discovery.

Along with the abuse of Microsoft SysInternal tools such as PsExec and other well-known open-source tools such as Putty and Mimikatz, Makop has abused even more peculiar software.

  • The attackers recently used Advanced Port Scanner and the Windows Everything tool.
  • Another unique tool used by the group includes a system administration tool called YDArk. It is an open-source tool available on GitHub.

YDArk process hiding feature

Source

The Makop ransomware gang has an arsenal of both custom-developed and off-the-shelf software tools at its disposal. The use of these tools is a clear indicator of the evolving techniques cybercriminals use to conduct digital extortions. In order to defend themselves against Makop ransomware attacks, organizations need to conduct regular security audits and keep their software up to date.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

Author Profile

Mihaela Popa

COMMUNICATIONS & PR OFFICER

Mihaela is a digital content creator for Heimdal® and the proud owner of an old soul and a curious mind. Passionate to learn and discover more about cybersecurity, she will gladly share her latest finds with you.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE