Article Details
Scrape Timestamp (UTC): 2025-03-26 14:07:38.072
Original Article Text
Click to Toggle View
RedCurl cyberspies create ransomware to encrypt Hyper-V servers. A threat actor named 'RedCurl,' known for stealthy corporate espionage operations since 2018, is now using a ransomware encryptor designed to target Hyper-V virtual machines. Previously, RedCurl was spotted by Group-IB targeting corporate entities worldwide, later expanding its operations and increasing the victim count. However, as Bitdefender Labs researchers report, the threat actors have started deploying ransomware on compromised networks. "We've seen RedCurl stick to their usual playbook in most cases, continuing with data exfiltration over longer periods of time," reads the Bitdefender report. "However, one case stood out. They broke their routine and deployed ransomware for the first time." As the enterprise increasingly moves to virtual machines to host their servers, ransomware gangs have followed the trend, creating encryptors that specifically target virtualization platforms. While most ransomware operations focus on targeting VMware ESXi servers, RedCurl's new "QWCrypt" ransomware specifically targets virtual machines hosted on Hyper-V. QWCrypt attacks The attacks observed by Bitdefender start with phishing emails with ".IMG" attachments disguised as CVs. IMG files are disk image files that are automatically mounted by Windows under a new drive letter when they are double-clicked. The IMG files contain a screensaver file vulnerable to DLL sideloading using a legitimate Adobe executable, which downloads a payload and sets persistence via a scheduled task. RedCurl leverages "living-off-the-land" tools to maintain stealth on Windows systems, uses a custom wmiexec variant to spread laterally in the network without triggering security tools, and uses the tool 'Chisel' for tunneling/RDP access. To turn off defenses before the ransomware deployment, the attackers use encrypted 7z archives and a multi-stage PowerShell process. Unlike many Windows ransomware encryptors, QWCrypt supports numerous command-line arguments that control how the encryptor will target Hyper-V virtual machines to customize attacks. In attacks seen by Bitdefender, RedCurl utilized the --excludeVM argument to avoid encrypting virtual machines that acted as network gateways to avoid disruption. When encrypting files, the researchers say that QWCrypt ('rbcw.exe') uses the XChaCha20-Poly1305 encryption algorithm and appends either the .locked$ or .randombits$ extension to encrypted files. The encryptor also offers the option to use intermittent encryption (block skipping) or selective file encryption based on size for increased speed. The ransom note created by QWCrypt is named "!!!how_to_unlock_randombits_files.txt$" and contains a mixture of text from LockBit, HardBit, and Mimic ransom notes. The absence of a dedicated leak site for double extortion raises questions on whether RedCurl is using ransomware as a false flag or for true extortion attacks. Money, disruption, or diversion? Bitdefender outlines two main hypotheses for why RedCurl now includes ransomware in its operations. The first is that RedCurl operates as a mercenary group offering services to third parties, which results in a mix of espionage operations and financially motivated attacks. In some situations, the ransomware could be a distraction to cover for data theft, or a fallback to monetize access when a client fails to pay for their primary services (data collection). The second theory is that RedCurl does engage in ransomware operations for enrichment, but opts to do so silently, preferring private negotiations over public ransom demands and data leaks. "The RedCurl group's recent deployment of ransomware marks a significant evolution in their tactics," concludes Bitdefender. "This departure from their established modus operandi raises critical questions about their motivations and operational objectives." Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
RedCurl, a group known for corporate espionage since 2018, has started deploying ransomware in compromised networks, a shift in their usual operations.
Bitdefender researchers have observed attacks particularly targeting Hyper-V virtual machines with "QWCrypt" ransomware, which differentiates from the common focus on VMware ESXi servers.
Initial infection vectors include phishing emails with .IMG attachments, camouflaged as CVs, enabling DLL sideloading through legitimate Adobe executables to introduce malware.
The attackers employ various stealth tactics, using "living-off-the-land" tools, a custom wmiexec for lateral movement, and the 'Chisel' tool for secure RDP access.
QWCrypt ransomware features advanced options for targeted encryption, supporting command-line arguments to tailor attacks specifically to Hyper-V environments and offers selective encryption strategies to speed up the encryption process.
Financial motives behind using ransomware could be multifaceted: it might serve as a distraction during espionage, a method for monetization after data theft, or possibly as a false flag operation.
No dedicated leak site for double extortion indicates possible private negotiations for ransom rather than public demands, suggesting a quieter, potentially more strategic approach to ransomware deployment by RedCurl.