Vice Society
Formation | 2021 |
---|---|
Type | Hacking |
Vice Society is a hacking group known for ransomware extortion attacks on healthcare, educational and manufacturing organizations.[1] The group emerged in the summer of 2021 and is believed to be Russian-speaking.[2][3] Vice Society uses double extorsion and does not operate a ransomware as a service model.
They have attacked targets in both Europe[4][5] and the United States, including a major compromise of the Los Angeles Unified School District.[6]
Description
[edit]The group emerged in the summer of 2021.[7] It has disproportionately targeted the education sector. Research from cybersecurity firm Palo Alto Networks found that Vice Society had listed 33 schools on its data leak site in 2022 alone.[8] Experts categorize Vice Society as a "second- or third-tier" ransomware group in terms of sophistication. However, its prolific attacks on lesser-known schools and regional hospitals have allowed Vice Society to fly under the radar.[9]
Vice Society engages in double extortion, stealing data for leverage in ransom negotiations. They threaten to publish exfiltrated data on dedicated leak sites if ransom demands are not met. Initial ransom demands have exceeded US$1 million, with final negotiated amounts around US$460,000.[10] The group is known to negotiate ransoms down from initial multimillion dollar demands.[8]
Unlike many ransomware groups, Vice Society does not operate using a ransomware as a service model with affiliate hackers. Instead, the group conducts its own intrusions and deployments. This allows Vice Society to quickly move through target networks, with dwell times as short as 6 days before detection.[8]
The group gained significant attention in late 2022 and early 2023 due to a series of high-profile attacks, including one targeting the rapid transit system in San Francisco.[1]
Tactics and techniques
[edit]According to the U.S. Cybersecurity and Infrastructure Security Agency, Vice Society have not developed their own in-house attack tools, instead using the Hello Kitty/Five Hands and Zeppelin ransomware toolkits.[3] More recently, the group has developed its own custom ransomware builder and implemented stronger encryption methods.[1]
Vice Society threat actors have exploited vulnerabilities such as PrintNightmare (CVE-2021-1675, CVE-2021-34527) to gain initial access to target networks.[10]
The group primarily gains initial network access by exploiting internet-facing applications through compromised credentials. Prior to deploying ransomware, Vice Society actors spend time exploring the network, seeking opportunities to increase access and exfiltrating data for double extortion purposes. To move laterally, they employ various tools such as SystemBC, PowerShell Empire, and Cobalt Strike. Moreover, the group uses techniques like targeting the legitimate Windows Management Instrumentation service and tainting shared content. They have also been observed exploiting the PrintNightmare vulnerability to escalate privileges. To maintain persistence, Vice Society uses scheduled tasks, undocumented autostart Registry keys, and DLL side-loading. In an effort to evade detection, the actors disguise their malware and tools as legitimate files, employ process injection, and likely use evasion techniques against automated dynamic analysis. Additionally, Vice Society actors have been known to escalate privileges, gain access to domain administrator accounts, and change victims' network account passwords to impede remediation efforts.[7]
An analysis of Vice Society's tactics showed the use of tools like Cobalt Strike and Mimikatz to escalate privileges and move laterally within a network. The group disables antivirus software and deletes system logs to evade detection. Encrypted files are appended with the ".v1cesO0ciety" extension and a ransom note is displayed.[11]
References
[edit]- ^ a b c "Vice Society Ransomware Group Targets Manufacturing Companies". Trend Micro. 2023-01-24. Retrieved 2023-07-17.
- ^ Newman, Lily Hay. "How Vice Society Got Away With a Global Ransomware Spree". Wired. ISSN 1059-1028. Retrieved 2022-10-22.
- ^ a b "Alert (AA22-249A) #StopRansomware: Vice Society". Cybersecurity and Infrastructure Security Agency. September 8, 2022. Retrieved 2022-10-22.
- ^ "Internet-Erpresser veröffentlichen Gigabyte an vertraulichen Daten der Gemeinde Rolle VD" (in German). Retrieved 2021-11-01.
- ^ "Wenn ein Cyberangriff eine Hochschule ausknockt" (in German). Der Spiegel. Retrieved 2022-01-13.
- ^ Gooding, Matthew (2022-09-26). "Vice Society claims ransomware attack that hit six UK schools in Scholars' Education Trust". Tech Monitor. Retrieved 2022-10-22.
- ^ a b "#StopRansomware: Vice Society | CISA". www.cisa.gov. 2022-09-08. Retrieved 2023-07-17.
- ^ a b c "Vice Society ransomware 'persistent threat' to education sector | TechTarget". Security. Retrieved 2023-08-01.
- ^ Newman, Lily Hay. "How Vice Society Got Away With a Global Ransomware Spree". Wired. ISSN 1059-1028. Retrieved 2023-08-01.
- ^ a b Gumarin, J. R. (2022-12-06). "Vice Society: Profiling a Persistent Threat to the Education Sector". Unit 42. Retrieved 2023-08-01.
- ^ "Vice Society Ransomware Group Targets Manufacturing Companies". Trend Micro. 2023-01-24. Retrieved 2023-08-01.