ThreeAM Ransomware: A Growing Threat to Small and Medium-Sized Businesses

In recent times, security analysts at Intrinsic made a startling discovery – the emergence of a dangerous ransomware strain called ThreeAM (aka 3 AM, ThreeAM time) that has been actively targeting small and medium-sized companies. This article delves into the various characteristics, tactics, and impacts of ThreeAM ransomware, shedding light on the evolving threat landscape and the need for proactive security measures.

Ransomware Features and Characteristics

ThreeAM ransomware sets itself apart with its unique set of features and characteristics. Firstly, if the victims fail to pay the ransom demanded, their sensitive data is exposed on a leak site. Additionally, this ransomware has been linked to the research and development efforts of ex-Conti members, who are now operating under the name Royal. Symantec has further unveiled the connection between ThreeAM ransomware and the notorious Conti-Ryuk-TrickBot nexus. It is an emerging Rust-based threat that acts as a fallback for failed LockBit deployments. Notably, the ransomware erases Volume Shadow copies and appends the ‘.ThreeAMtime’ extension to encrypted files. Encrypted files are identifiable by a unique marker string, ‘0x666’.

Previous Cyberthreat Incidents Linked to ThreeAM

Previous cyber threat incidents have been observed that point to the emergence and evolution of ThreeAM ransomware. In July 2022, the domain wirelessrepaid626[.]com was identified as being linked to Formbook and phishing activities. This highlights the ransomware’s connection to a broader network of cybercriminal operations. Additionally, a thorough payload analysis revealed the presence of a ‘260.6 KB’ DLL, compiled around 2019-12-05, which aligns with the tactics, techniques, and procedures (TTPs) of ex-Conti and LockBit.

Operational Tactics and Strategies

The operators behind the ThreeAM ransomware employ various operational tactics and strategies to maximize their impact. One such method is the operation of a name-and-shame blog on the dark web through TOR. This blog serves as a platform for the ransomware operators to publicly shame their victims who fail to pay the demanded ransoms. This form of double extortion further intensifies the pressure on affected businesses to comply.

Impact and Victimology

The ThreeAM ransomware has wreaked havoc on a dozen US businesses between September 13 and October 26, 2023, with a specific focus on small and medium-sized enterprises. The nature of the victims reflects an alarming trend, with 10 of them having a maximum of 50 employees and less than $5 million in revenue. This victimology aligns with the evolving ransomware tactics that increasingly favor mid-size businesses. The consequences for these victims can be devastating, resulting in financial losses, reputational damage, and potential legal liabilities.

The top-tier ransomware ecosystem is evolving at a rapid pace, with threats like ThreeAM ransomware continually pushing the boundaries of cybercriminal capabilities. To counter such threats effectively, businesses must prioritize proactive security measures. This includes implementing robust cybersecurity protocols, conducting regular vulnerability assessments, and educating employees about best practices to prevent phishing and social engineering attacks. By staying one step ahead of cybercriminals, organizations can minimize their vulnerability and safeguard their data and operations from the ever-growing menace of ransomware attacks.

Explore more

How B2B Teams Use Video to Win Deals on Day One

The conventional wisdom that separates B2B video into either high-level brand awareness campaigns or granular product demonstrations is not just outdated, it is actively undermining sales pipelines. This limited perspective often forces marketing teams to choose between creating content that gets views but generates no qualified leads, or producing dry demos that capture interest but fail to build a memorable

Data Engineering Is the Unseen Force Powering AI

While generative AI applications capture the public imagination with their seemingly magical abilities, the silent, intricate work of data engineering remains the true catalyst behind this technological revolution, forming the invisible architecture upon which all intelligent systems are built. As organizations race to deploy AI at scale, the spotlight is shifting from the glamour of model creation to the foundational

Is Responsible AI an Engineering Challenge?

A multinational bank launches a new automated loan approval system, backed by a corporate AI ethics charter celebrated for its commitment to fairness and transparency, only to find itself months later facing regulatory scrutiny for discriminatory outcomes. The bank’s leadership is perplexed; the principles were sound, the intentions noble, and the governance committee active. This scenario, playing out in boardrooms

Trend Analysis: Declarative Data Pipelines

The relentless expansion of data has pushed traditional data engineering practices to a breaking point, forcing a fundamental reevaluation of how data workflows are designed, built, and maintained. The data engineering landscape is undergoing a seismic shift, moving away from the complex, manual coding of data workflows toward intelligent, outcome-oriented automation. This article analyzes the rise of declarative data pipelines,

Trend Analysis: Agentic E-Commerce

The familiar act of adding items to a digital shopping cart is quietly being rendered obsolete by a sophisticated new class of autonomous AI that promises to redefine the very nature of online transactions. From passive browsing to proactive purchasing, a new paradigm is emerging. This analysis explores Agentic E-Commerce, where AI agents act on our behalf, promising a future