Encryption and data exfiltration by Ransomhub on industrial control systems

Ransomhub, a new ransomware group, has targeted the SCADA system of a Spanish bioenergy factory, Matadero de Gijón, which emphasizes the necessary safety hazards associated with Industrial Control Systems (ICS) across different enterprises. Since 2022, multiple cyberattacks have manipulated vulnerabilities in ICS, driving substantial troubles to processes and infrastructure. This emphasizes the requirement for strong protection measurements to protect ICS domains. 

The Ransomhub ransomware group claimed unauthorized access to Gijón’s Bio-Energy Plant’s Supervisory Control and Data Acquisition (SCADA) system, which is essential for industrial process control. The Ransomhub ransomware group claimed unauthorized access to Gijón’s Bio-Energy Plant’s Supervisory Control and Data Acquisition (SCADA) system, which is essential for industrial process control. The group supplied screenshots as proof, showcasing their capability to exploit the plant’s Digester and Heating system management.

While the actual altitude of the information violation stays dark (varying between 15 GB and 400 GB), the compromised SCADA system poses a substantial threat to the manufacturer’s operations. 

Ransomhub, a RaaS process first announced in February 2024, uses Golang and C++ for its safe element and influences asymmetric cryptography (x25519) and a mixture of symmetric algorithms (aes256, chacha20, and xchacha20) to encrypt victim data while conducting quickly encryption speeds.

Notably, Ransomhub prohibits attacks on CIS countries, Cuba, North Korea, and China, perhaps reflecting pro-Russian leanings. Since its emergence, they have asserted duty for 68 attacks, mainly targeting the IT & ITES sector and associations within the United States.

According to CRIL, they have been actively attempting to extend their spread, as they tried to recruit affiliates left back by ALPHV/BlackCat’s exit fraud by recording their targets on their DLS. However, the affiliates’ lack of interest directed them to release the targets. To gain notoriety, Ransomhub has attempted to capitalize on high-profile incidents like the Change Healthcare ransomware attack and is now creating unfounded assertions of attacking SCADA systems.

They are targeting SCADA systems using robbed details that they acknowledged on Russian media from Initial Access Brokers, which indicates that ransomware groups are evolving more interested in Industrial Control Systems (ICS) conditions, particularly those with linked Virtual Network Computing (VNC) instruments. 

Safety investigators alert that such configurations significantly boost the hazard of similar attacks and encourage a vital reassessment of cybersecurity techniques to save these critical infrastructures. The anticipation is that ransomware groups will increasingly target OT environments and their members in the end.