Nokoyawa ransomware attacks
BOTTOM LINE UP FRONT (BLUF):
Nokoyawa Ransomware, active since early 2022 and evolving to leverage Rust, employs IcedID for initial access, and exploits a vulnerability in the Microsoft Common Log File System (CLFS). Recently, the ransomware syndicate has been observed attacking institutions within Australia's Higher Education sector. To mitigate risks, members are advised to implement the recommendations within.?
EXECUTIVE SUMMARY:
Nokoyawa Ransomware, initially identified in February 2022, has undergone significant evolution, including a shift to the Rust programming language in September 2022. This ransomware variant demonstrates a complex attack path, often leveraging initial access through IcedID malware and exploiting vulnerabilities in Microsoft products.?
THREAT CONTEXT:
Nokoyawa, believed to have connections with the Hive group, has recently targeted an Information Technology company headquartered in Sydney, Australia. Additionally, member reporting has confirmed multiple attacks, which were detected within the Higher Education and Research sector.
The purported link to Hive brings additional credibility and risk to the Nokoyawa threat as both groups exhibit similar attack patterns and use comparable malware deployment and defence evasion tools.
Nokoyawa had targeted South American entities, particularly in Argentina, before attacking Australian entities. The impacted entity provides technical support to the Australian Government and participating in numerous government projects and advisories. ?
领英推荐
As with many ransomware groups, attacks are often opportunistic, however proactive steps should be taken by members to uplift their defences..
TECHNICAL INFORMATION:
At a high level, Nokoyawa's attacks follow a number of standard stages:
RECOMMENDATIONS:
DISCLAIMER:
CI-ISAC advisories are based on information gathered from open and closed sources and all efforts have been made to ensure that the information in this advisory is accurate and is provided ‘as is’ by CI-ISAC. Members are advised to take into account their own environment’s configuration and existing security controls to make a risk-informed decision before acting on the recommendations provided above.