RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems


The RansomHub ransomware group has rapidly emerged as one of the most prolific cybercrime syndicates of 2024–2025.

As this ransomware group done by expanding its arsenal to target Windows, VMware ESXi, Linux, and FreeBSD systems in global attacks.

RansomHub ransomware group leverages advanced evasion techniques, cross-platform encryption, and vulnerabilities in enterprise infrastructure.

Group-IB analysts have discovered that the group has compromised over 600 organizations, including healthcare, finance, and critical infrastructure sectors.

Multi-OS Encryption Capabilities

RansomHub’s ransomware variants are tailored for diverse environments, featuring unique command-line arguments and encryption methods per platform.

powershell RansomHub.exe -pass -fast -disable-net -skip-vm "VM1"

A JSON configuration file, decrypted at runtime, specifies whitelisted directories, kill lists for processes/services, and credentials for lateral movement.

The ESXi encryptor (C++-based) disrupts virtual machines using vim-cmd commands and encrypts VM files (.vmdk, .vmx) with ChaCha20 and Curve25519 algorithms.

A flawed /tmp/app.pid check allows defenders to prevent encryption by writing -1 to the file, forcing an infinite loop.

c // Code snippet from ESXi encryptor if (access("/tmp/app.pid", F_OK) == 0) { pid_t pid = read_pid(); if (kill(pid, 0) == 0) { kill(pid, SIGKILL); exit(0); } }

The Linux variant uses intermittent encryption (1 MB chunks) and terminates services like syslog to hinder detection.

The FreeBSD version, detected as Ransom.FreeBSD.INTERLOCK.THJBBBD, avoids critical directories (/boot, /etc) and appends .interlock to files.

RansomHub affiliates exploit vulnerabilities such as CVE-2024-3400 (Palo Alto firewalls) and CVE-2021-42278/CVE-2020-1472 (Active Directory) for initial access.

Extract of security advisory released by Palo Alto (Source – Group-IB)

Post-compromise, they deploy:-

  • PCHunter: Terminates EDR processes and deletes logs.
  • FileZilla: Exfiltrates data to C2 servers.
  • BYOVD attacks: Use vulnerable drivers (POORTRY.sys) to disable security tools.

RansomHub’s affiliate panel, acquired from the defunct Knight ransomware, enables customizable ransom notes and leak site integrations.

Ransomware configuration file (Source – Group-IB)

The group threatens victims with regulatory reporting (PDPL violations) to pressure payments.

json // Decrypted configuration snippet { "master_public_key": "a1b2c3...", "extension": ".6706c3", "note_file_name": "README.txt", "kill_processes": ["MsMpEng.exe", "TaniumCX.exe"] }

RansomHub ransom note (Source – Group-IB)

CISA urges organizations to immediately patch CVE-2024-3400 and audit remote services to mitigate the growing threat posed by RansomHub.

Detection strategies include using YARA rules for RansomHub binaries, monitoring for suspicious PowerShell commands like Get-CimInstance Win32_ShadowCopy | Remove-CimInstance, and blocking known indicators of compromise (IoCs) such as IP 10.10.10.10:22 and TOR URLs.

With RansomHub actively exploiting zero-day vulnerabilities and recruiting displaced ALPHV/LockBit affiliates, organizations must strengthen endpoint security and ensure backup isolation to prevent potential attacks.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free



Source link