ThreeAM Ransomware: A Growing Threat to Small and Medium-Sized Businesses

In recent times, security analysts at Intrinsic made a startling discovery – the emergence of a dangerous ransomware strain called ThreeAM (aka 3 AM, ThreeAM time) that has been actively targeting small and medium-sized companies. This article delves into the various characteristics, tactics, and impacts of ThreeAM ransomware, shedding light on the evolving threat landscape and the need for proactive security measures.

Ransomware Features and Characteristics

ThreeAM ransomware sets itself apart with its unique set of features and characteristics. Firstly, if the victims fail to pay the ransom demanded, their sensitive data is exposed on a leak site. Additionally, this ransomware has been linked to the research and development efforts of ex-Conti members, who are now operating under the name Royal. Symantec has further unveiled the connection between ThreeAM ransomware and the notorious Conti-Ryuk-TrickBot nexus. It is an emerging Rust-based threat that acts as a fallback for failed LockBit deployments. Notably, the ransomware erases Volume Shadow copies and appends the ‘.ThreeAMtime’ extension to encrypted files. Encrypted files are identifiable by a unique marker string, ‘0x666’.

Previous Cyberthreat Incidents Linked to ThreeAM

Previous cyber threat incidents have been observed that point to the emergence and evolution of ThreeAM ransomware. In July 2022, the domain wirelessrepaid626[.]com was identified as being linked to Formbook and phishing activities. This highlights the ransomware’s connection to a broader network of cybercriminal operations. Additionally, a thorough payload analysis revealed the presence of a ‘260.6 KB’ DLL, compiled around 2019-12-05, which aligns with the tactics, techniques, and procedures (TTPs) of ex-Conti and LockBit.

Operational Tactics and Strategies

The operators behind the ThreeAM ransomware employ various operational tactics and strategies to maximize their impact. One such method is the operation of a name-and-shame blog on the dark web through TOR. This blog serves as a platform for the ransomware operators to publicly shame their victims who fail to pay the demanded ransoms. This form of double extortion further intensifies the pressure on affected businesses to comply.

Impact and Victimology

The ThreeAM ransomware has wreaked havoc on a dozen US businesses between September 13 and October 26, 2023, with a specific focus on small and medium-sized enterprises. The nature of the victims reflects an alarming trend, with 10 of them having a maximum of 50 employees and less than $5 million in revenue. This victimology aligns with the evolving ransomware tactics that increasingly favor mid-size businesses. The consequences for these victims can be devastating, resulting in financial losses, reputational damage, and potential legal liabilities.

The top-tier ransomware ecosystem is evolving at a rapid pace, with threats like ThreeAM ransomware continually pushing the boundaries of cybercriminal capabilities. To counter such threats effectively, businesses must prioritize proactive security measures. This includes implementing robust cybersecurity protocols, conducting regular vulnerability assessments, and educating employees about best practices to prevent phishing and social engineering attacks. By staying one step ahead of cybercriminals, organizations can minimize their vulnerability and safeguard their data and operations from the ever-growing menace of ransomware attacks.

Explore more

Signed Contract Does Not Establish Employment Relationship

A signed employment agreement often feels like the definitive closing of a chapter for a job seeker, providing a sense of security and a formal entry into a new professional environment. For many, the ink on the page represents the literal birth of an employment relationship, carrying with it all the statutory protections and rights afforded by modern labor laws.

Court Backs Employer Rights After Union Decertification

Strengthening Employer Autonomy in the Decertification Process The legal boundaries governing when an employer can officially stop recognizing a union have long been a source of intense friction between corporate management and labor organizers. The recent ruling by the U.S. Court of Appeals for the Eighth Circuit in Midwest Division-RMC, LLC v. NLRB represents a pivotal moment in the landscape

Why Do Companies Punish Their Most Loyal Employees?

The modern professional landscape has birthed a unsettling phenomenon where a worker’s greatest asset—their willingness to go above and beyond—frequently becomes their most significant liability in the eyes of corporate management. This “loyalty trap” describes a systemic pattern where high-performing individuals are exploited for their dedication rather than rewarded with the advancement they have earned through their labor. As the

Is AI a Thinking Partner or Just a Productivity Tool?

The transition from treating generative artificial intelligence as a simple digital assistant to integrating it as a sophisticated cognitive collaborator represents the most significant shift in corporate strategy since the dawn of the internet age. While millions of professionals now have access to large language models, a comprehensive analysis of 1.4 million workplace interactions reveals that broad accessibility does not

Victoria Proposes Legal Right to Work From Home

The Victorian Government’s decision to codify a legal right to work from home marks a transformative moment in the history of Australian labor relations, fundamentally altering the traditional power balance between employer and employee. This landmark proposal, which aims to provide eligible workers the statutory entitlement to perform their duties remotely for at least two days each week, reflects a