The Royal Ransomware Group: A Deep Dive into Their Attacks and Tactics

The rise of ransomware attacks has caused significant concerns for organizations worldwide. Among the notorious groups, the Royal ransomware group has emerged as a prominent threat actor, impacting over 350 global victims since September 2022. Their demands for hundreds of millions in ransom payments have put various industries on edge. In this article, we will delve into the workings of the Royal group, analyzing their methods, tools, and impact on targeted sectors.

Updated Cybersecurity Advisory

To combat the evolving threat landscape, a revised cybersecurity advisory has been released, incorporating new information and insights since the initial report in March 2023. The updated advisory includes refreshed indicators of compromise (IOCs) and details on the group’s tactics, techniques, and procedures (TTPs). This information aims to provide organizations with the necessary knowledge to detect and defend against attacks.

Tools and Techniques Used by Threat Actors

The Royal Group’s tactics involve utilizing a variety of tools and techniques to gain unauthorized access and exploit vulnerabilities. They have been observed employing open-source network tunneling tools like Chisel and Cloudflared. Additionally, they leverage the use of Secure Shell (SSH) clients such as OpenSSH and MobaXterm to establish SSH connections.

Furthermore, analysis of victim systems has revealed the presence of credential stealing tools like Mimikatz and password harvesting tools from Nirsoft. The Royal group’s reliance on legitimate remote access tools like AnyDesk, LogMeIn, and Atera Agent as backdoor access vectors poses a significant challenge for organizations seeking to identify and mitigate their activities.

Methods of initial access

Understanding how the Royal group gains initial access is crucial for preventing their attacks. Phishing remains their primary method, accounting for approximately two-thirds of their incidents. With carefully crafted emails, they trick unsuspecting victims into unknowingly downloading ransomware onto their systems.

Moreover, the Royal group frequently exploits Remote Desktop Protocol (RDP) compromises, gaining unauthorized access to systems with weak security controls. Although accounting for only 13% of incidents, RDP compromises remain a significant avenue for their successful attacks.

Lateral Movement Techniques

Once inside a victim’s network, the Royal group employs various techniques to move laterally, increasing their control and access. RDP and PsExec are frequently utilized by the group to navigate through the network, compromising additional systems and escalating their privileges.

Understanding the specific techniques employed by the Royal Group allows organizations to strengthen their security measures, ensuring that lateral movement is effectively detected and halted.

Data Aggregation and Exfiltration

To facilitate their operations, the Royal group deploys tools such as Cobalt Strike and malware like Ursnif/Gozi. These tools assist in aggregating and exfiltrating critical data from victim systems. Cobalt Strike enables the group to establish persistence, command-and-control communication, and perform reconnaissance, while Ursnif/Gozi act as data-stealing malware.

By gaining insights into the methods employed by the Royal Group for data aggregation and exfiltration, organizations can enhance their defenses by focusing on identifying and mitigating these specific threats.

Targeted sectors

The Royal Group indiscriminately targets organizations across various industries, with specific sectors experiencing a higher frequency of attacks. The healthcare, manufacturing, and education sectors have become prime targets due to their reliance on confidential patient data, intellectual property, and personal information.

Understanding the sectors most at risk allows organizations to prioritize their cybersecurity efforts, implement robust defenses, and raise awareness within these industries.

Ransom Demands

The Royal group’s motives ultimately revolve around financial gain, demanding substantial ransom payments in bitcoin to release encrypted data. Their ransom demands have ranged from around $1 million to $11 million. These exorbitant sums place significant financial strain on organizations, making it imperative to develop robust cybersecurity measures to prevent or mitigate attacks.

The Royal ransomware group’s relentless attacks have highlighted the pressing need for organizations to bolster their cybersecurity practices. By studying their tactics, techniques, and procedures, as well as understanding the sectors they frequently target, organizations can better fortify their defenses against the ever-evolving threat landscape. Implementing robust security measures, conducting regular security audits, and fostering a culture of cyber awareness will be crucial in minimizing the risk posed by groups like the Royal ransomware group and protecting valuable data from their clutches.

Explore more

Can You Spot a Deepfake During a Job Interview?

The Ghost in the Machine: When Your Top Candidate Is a Digital Mask The screen displays a perfectly polished professional who answers every complex technical question with surgical precision, yet a subtle, unnatural flicker near the jawline suggests something is deeply wrong. This unsettling scenario became reality at Pindrop Security during an interview with a candidate named “Ivan,” whose digital

Data Science vs. Artificial Intelligence: Choosing Your Path

The modern job market operates within a high-stakes environment where digital transformation has accelerated to a point that leaves even seasoned professionals questioning their specialized trajectory. Job boards are currently flooded with titles that seem to shift shape by the hour, creating a confusing landscape for those entering the technology sector. One listing calls for a data scientist with deep

How AI Is Transforming Global Hiring for HR Professionals?

The landscape of international recruitment has undergone a staggering metamorphosis that effectively erased the traditional borders once separating regional labor markets from the global economy. Half a decade ago, establishing a presence in a foreign market required exhaustive legal frameworks, exorbitant capital investment, and months of administrative negotiations. Today, the operational reality is entirely different; even nascent organizations can engage

Who Is Winning the Agentic AI Race in DevOps?

The relentless pressure to deliver software at breakneck speeds has pushed traditional CI/CD pipelines to a breaking point where manual intervention is no longer a sustainable strategy for modern engineering teams. As organizations navigate the complexities of distributed cloud systems, the transition from rigid automation to fluid, autonomous operations has become the defining challenge for the current technological landscape. This

How Email Verification Protects Your Sender Reputation?

Maintaining a flawless digital communication channel requires more than just compelling copy; it demands a rigorous defense against the invisible erosion of subscriber data that threatens every modern marketing department. Verification acts as a critical shield for the digital infrastructure of an organization, ensuring that marketing efforts actually reach the intended recipients instead of vanishing into the ether. This process