{"id":8366,"date":"2022-06-08T13:24:21","date_gmt":"2022-06-08T13:24:21","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=8366"},"modified":"2022-06-08T13:24:21","modified_gmt":"2022-06-08T13:24:21","slug":"evil-corp-switched-to-lockbit","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/evil-corp-switched-to-lockbit\/","title":{"rendered":"Evil Corp Switched to Using LockBit Malware to Avoid Sanctions"},"content":{"rendered":"<h4>The Evil Corp group switched to using the LockBit ransomware to avoid sanctions imposed earlier by the Office of Foreign Assets Control of the US Department of the Treasury (OFAC).<\/h4>\n<p>Let me remind you that <b>Evil Corp<\/b> has existed since at least 2007, but at first hackers more often acted as partners for other groups. It was only later that Evil Corp began to focus on its own attacks, creating the well-known banking Trojan <b>Dridex<\/b>. Over time, when it became a ransomware, attacks became more profitable, and Evil Corp launched its own <b>BitPaymer<\/b> ransomware, delivering it to victims&#8217; machines via Dridex. The latter gradually evolved from an ordinary banker into a complex and multifunctional tool.<\/p>\n<p>All this led to the fact that in 2019 <a target=\"_blank\" href=\"https:\/\/www.justice.gov\/opa\/pr\/russian-national-charged-decade-long-series-hacking-and-bank-fraud-offenses-resulting-tens\" rel=\"noopener nofollow\">the US authorities filed charges against two Russians<\/a> who, according to law enforcement officers, were behind the development of the Dridex malware and other malicious operations. Also, the US authorities imposed sanctions on 24 organizations and individuals associated with Evil Corp and the mentioned suspects. As a result, the negotiating companies, which usually negotiate with extortionists to pay a ransom and decrypt the data, refused to \u201cwork\u201d with Evil Corp in order to avoid fines and lawsuits from the US Department of the Treasury. And it became much more difficult for the victims themselves to pay the ransom.<\/p>\n<p>After that, in June 2020, <a href=\"\/blogs\/evil-corp-returns-to-criminal-activity-with-wastedlocker-ransomware\/\">Evil Corp switched to using the <b>WastedLocker<\/b> malware<\/a>, in 2021 the <b>Hades<\/b> ransomware appeared (a 64-bit version of WastedLocker, updated with additional code obfuscation and a number of functions), and then the group has already carried out several \u201crebrands\u201d and <a href=\"\/blogs\/evil-corp-posing-as-payloadbin-group\/\">impersonated for the <b>PayloadBin<\/b> grouping<\/a> and used other ransomware: <b>Macaw<\/b> and <b>Phoenix<\/b>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/Mandiant-Report.jpg\" alt=\"Evil Corp switched to LockBit\" title=\"\"><\/p>\n<p>Now, <a target=\"_blank\" href=\"https:\/\/www.mandiant.com\/resources\/unc2165-shifts-to-evade-sanctions\" rel=\"noopener nofollow\">Mandiant<\/a> analysts noticed that criminals have made a new attempt to distance themselves from hacking tools known to experts so that their victims can pay ransoms without violating <b>OFAC<\/b> rules.<\/p>\n<p>The activity cluster, which Mandiant tracks as <b>UNC2165<\/b>, previously deploying the Hades ransomware and associated with Evil Corp, is now &#8220;partnering&#8221; with the developers of the <b>LockBit<\/b> ransomware.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">Using this <b>RaaS<\/b> allows UNC2165 to merge with other LockBit affiliates. [Now] to establish the correct attribution, you need to observe the earlier stages of attacks, compared to their previous operations, which could be associated with [Evil Corp] through the use of exclusive ransomware. In addition, frequent code updates and rebranding of HADES required development resources, and it is likely that UNC2165 believes that using LOCKBIT is a more cost-effective choice.<span class=\"su-quote-cite\">the researchers say.<\/span><\/div><\/div>\n<p>It is assumed that the new tactics will allow hackers to spend the time saved on developing their own malware to expand operations.<\/p>\n<p>Experts also offer another theory: it is likely that the transition to other people&#8217;s malicious tools will help Evil Corp free up enough of its own resources to develop a new ransomware from scratch, which can subsequently seriously complicate tracking the new operations of the hack group.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Evil Corp group switched to using the LockBit ransomware to avoid sanctions imposed earlier by the Office of Foreign Assets Control of the US Department of the Treasury (OFAC). Let me remind you that Evil Corp has existed since at least 2007, but at first hackers more often acted as partners for other groups. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8369,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[232,233,649,55,235],"class_list":{"0":"post-8366","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-dridex","9":"tag-evil-corp","10":"tag-lockbit","11":"tag-ransomware","12":"tag-wastedlocker"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/Evil-Corp-switched-to-LockBit.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=8366"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8366\/revisions"}],"predecessor-version":[{"id":8368,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8366\/revisions\/8368"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/8369"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=8366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=8366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=8366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}