Article Details
Scrape Timestamp (UTC): 2025-05-02 14:39:22.587
Original Article Text
Click to Toggle View
US indicts Black Kingdom ransomware admin for Microsoft Exchange attacks. A 36-year-old Yemeni national, who is believed to be the developer and primary operator of 'Black Kingdom' ransomware, has been indicted by the United States for conducting 1,500 attacks on Microsoft Exchange servers. The suspect, Rami Khaled Ahmed, is accused of deploying the Black Kingdom malware on roughly 1,500 computers in the United States and abroad, demanding ransom payments of $10,000 in Bitcoin. "According to the indictment, from March 2021 to June 2023, Ahmed and others infected computer networks of several U.S.-based victims, including a medical billing services company in Encino, a ski resort in Oregon, a school district in Pennsylvania, and a health clinic in Wisconsin," explains a U.S. Department of Justice announcement. "When the malware was successful, the ransomware then created a ransom note on the victim's system that directed the victim to send $10,000 worth of Bitcoin to a cryptocurrency address controlled by a co-conspirator and to send proof of this payment to a Black Kingdom email address," reads another part of the announcement. The U.S. DoJ highlights that Ahmed designed Black Kingdom ransomware to exploit a vulnerability in Microsoft Exchange for initial access to targeted computers. This was first reported in March 2021 by researcher Marcus Hutchins, who discovered web shells deployed by Black Kingdom ransomware operators on Exchange servers vulnerable to ProxyLogon attacks. The ProxyLogon flaw refers to a set of critical vulnerabilities in Microsoft Exchange Server that were first disclosed and exploited in early 2021. The flaws are CVE-2021-26855 (Server-Side Request Forgery used for initial access), CVE-2021-26857 (insecure deserialization used for privilege escalation to SYSTEM), and CVE-2021-26858 and CVE-2021-27065 (arbitrary file write used for writing web shells to servers). Soon, Microsoft confirmed that Black Kingdom had compromised 1,500 Exchange servers by leveraging ProxyLogon flaws. In June 2020, it was revealed that Black Kingdom targeted CVE-2019-11510, a critical vulnerability affecting Pulse Secure VPN, to breach corporate networks and deploy their file lockers. For his Black Kingdom attacks, Ahmed now faces charges of conspiracy, intentional damage to a protected computer, and threatening damage to a protected computer. If convicted, Ahmed faces a statutory maximum sentence of five years in federal prison for each count, totaling up to 15 years. The U.S. DoJ states that Ahmed is believed to be residing in Yemen. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
A 36-year-old Yemeni, Rami Khaled Ahmed, is indicted for orchestrating 1,500 ransomware attacks on Microsoft Exchange servers globally.
The malware deployed, known as Black Kingdom, demanded $10,000 in Bitcoin as a ransom for each attack.
Victims of these attacks included diverse U.S. entities such as medical billing companies, ski resorts, school districts, and health clinics.
Black Kingdom ransomware exploited the ProxyLogon vulnerability in Microsoft Exchange servers to gain unauthorized access.
This vulnerability suite in Microsoft Exchange was first identified and exploited widely in early 2021.
In addition to Exchange server attacks, Ahmed had previously targeted vulnerabilities in Pulse Secure VPN to breach networks.
If convicted on all counts, Ahmed faces up to 15 years in federal prison, charged with conspiracy and causing intentional damage to protected computers.
The suspect, Rami Khaled Ahmed, is currently believed to be residing in Yemen.