Article Details
Scrape Timestamp (UTC): 2025-02-20 08:03:08.311
Original Article Text
Click to Toggle View
New NailaoLocker ransomware used against EU healthcare orgs. A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024. The attacks exploited CVE-2024-24919, a Check Point Security Gateway vulnerability, to gain access to targeted networks and deploy the ShadowPad and PlugX malware, two families tightly associated with Chinese state-sponsored threat groups. Orange Cyberdefense CERT links the attacks to Chinese cyber-espionage tactics, though there's not enough evidence to attribute them to specific groups. NailaoLocker details Orange's researchers report that NailaoLocker is a relatively unsophisticated ransomware strain compared to the most prominent families in the space. The reason why Orange sees NailaoLocker as a rather basic ransomware is that, it does not terminate security processes or running services, it lacks anti-debugging and sandbox evasion mechanisms, and does not scan network shares. "Written in C++, NailaoLocker is relatively unsophisticated and poorly designed, seemingly not intended to guarantee full encryption," mentions Orange. The malware is deployed on target systems via DLL sideloading (sensapi.dll) involving a legitimate and signed executable (usysdiag.exe). The malware loader (NailaoLoader) verifies the environment by performing memory address checks and then decrypts the main payload (usysdiag.exe.dat) and loads it into memory. Next, the NailaoLocker activates and begins encrypting files using an AES-256-CTR scheme, appending the ".locked" extension to encrypted files. After the encryption is done, the ransomware drops an HTML ransom note with the very unusually long filename of "unlock_please_view_this_file_unlock_please_view_this_file_unlock_please_view_this_file_unlock_please_view_this_file_unlock_please_view_this_file_unlock_please_view_this_file_unlock_please.html." This ransom note instructs the victims to contact them at a disposable ProtonMail address, which, in a few cases seen by BleepingComputer, was johncollinsy@proton[.]me. The ransom note does not indicate that data was stolen, which is odd for most modern ransomware operations. Espionage and ransomware combined Investigating deeper, Orange says they found some overlap between the content of the ransom note and a ransomware tool sold by a cybercrime group named Kodex Softwares (formerly Evil Extractor). However, there were no direct code overlaps, making the connection blurry. Orange has shared several hypotheses for the attacks, including false flag operations meant to distract, strategic data theft operations doubled with revenue generation, and, more likely, a Chinese cyberespionage group "moonlighting" on the side to earn some money. Only last week, Symantec reported about suspected Emperor Dragonfly (a.k.a. Bronze Starlight) operatives deploying RA World ransomware against Asian software firms and demanding a ransom of $2 million. Compared to North Korean actors who are known to pursue multiple goals in parallel, including financial gains via ransomware attacks, Chinese state-backed actors haven't followed this approach, so the shift in tactics is concerning.
Daily Brief Summary
A new ransomware, NailaoLocker, has been detected in attacks on European healthcare organizations from June to October 2024.
The ransomware exploited a vulnerability identified as CVE-2024-24919 in Check Point Security Gateways to infiltrate networks.
Attack patterns and tool usage suggest links to Chinese state-sponsored cyber-espionage, although no direct attribution to specific groups has been established.
NailaoLocker, written in C++, displays less sophistication compared to other ransomware strains, lacking advanced evasion and persistence features.
The ransomware deploys via DLL sideloading, utilizes AES-256-CTR encryption, and appends a ".locked" extension to affected files.
Victims receive a ransom note with an unusually long filename, instructing them to contact the attackers via a disposable email address without indications of stolen data.
Overlaps between NailaoLocker’s ransom note and tools from a cybercrime group add complexity to the attack’s motive, suggesting possible false flag operations or dual-purpose attacks for espionage and financial gain.
Shift in tactics observed among Chinese state-backed actors, potentially mirroring North Korean strategies of integrating financial gain with espionage activities.