Threat Intel Banner
Ransomware Hits Last Week Chart

Stormous Ransomware Group

Stormous is a ransomware group notorious for targeting a wide range of entities, including websites, companies, and organisations primarily in the United States and Ukraine. Their modus operandi involves encrypting victims' data and demanding payment for its release, posing significant threats to data security and integrity.

The group has garnered attention for claiming responsibility for cyber-attacks on major American brands such as Coca-Cola, Mattel, and Danaher. Additionally, they have targeted critical entities like the Ukraine Ministry of Foreign Affairs, acquiring sensitive information in the process.

One distinguishing aspect of Stormous is their proclaimed allegiance to Russia in its ongoing conflict with Ukraine. Exploiting the heightened tensions between the two nations, Stormous has used this allegiance to bolster their reputation. However, there exists a debate among experts regarding whether their actions are politically motivated or primarily driven by financial gain.

Tactics, Techniques, and Procedures (TTPs)

Phishing Email: Phishing emails represent one of the most prevalent infection vectors utilised by ransomware, Stormous included. These deceptive emails often contain malicious attachments or links. Upon interaction, such as clicking a link or opening an attachment, the ransomware is downloaded and executed on the victim's system. Stormous utilises phishing emails that masquerade as messages from organisations claiming to assist victims of the conflict in Ukraine.

Exploiting vulnerabilities: Stormous may exploit vulnerabilities within software or operating systems to infiltrate systems. This encompasses unpatched systems, vulnerable websites, and compromised VPN servers.

Remote Desktop Protocol (RDP): RDP facilitates remote access to computers or servers. If RDP configurations are inadequately secured, they can serve as entry points for ransomware attacks, including those carried out by Stormous.

Ads and pop-ups: Ransomware, including Stormous, can leverage advertisements and pop-ups on websites as a means of infiltration.

Credential abuse: This involves the illicit use of stolen or weak login credentials to gain unauthorised access to systems.

Stormous ransomware operates according to a typical ransomware attack pattern. While specific details about Stormous ransomware may be limited, we can deduce its operational method based on general knowledge about ransomware attacks.

Initial infection

Stormous ransomware gains entry to a computer or network through various means, including exploiting software vulnerabilities, phishing emails, or Remote Desktop Protocol (RDP) attacks.

File Encryption

Once infiltrated, Stormous ransomware initiates the encryption process, locking files on the infected device and potentially extending to connected network drives.

Ransom Demand

Following file encryption, a ransom note is typically delivered, demanding payment in exchange for the decryption key and a pledge not to leak the stolen data. Attackers commonly demand payment in cryptocurrencies like Bitcoin to obscure transaction tracing.

Leak Site: Stormous maintains a leak site on the dark web where they threaten to publish stolen data if the ransom is not paid.


Kill Chain:

Tactic 
Technique ID 
Technique Name 
Execution
T1204 
User Execution
Defence Evasion
T1070
Delete Shadow drive data
Discovery
T1217
T1082
T1083
Browser Information Discovery
System Information Discovery
File and Directory Discovery
Impact
T1486 
T1490 
Data Encrypted for Impact 
Inhibit System Recovery


Indicators of Compromise (IOCs)

Indicators
Indicator Type
Description
96ba3ba94db07e895090cdaca701a922523649cf6d6801b358c5ff62416be9fa
b7863120606168b3731395d9850bbf25661d05c6e094c032fc486e15daeb5666
Hash
Stormous Ransomware
3slz4povugieoi3tw7sblxoowxhbzxeju427cffsst5fo2tizepwatid.onion
h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion
ransekgbpijp56bflufgxptwn5hej2rztx423v6sim2zrzz7xetnr2qd.onion
pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion
stmxylixiz4atpmkspvhkym4xccjvpcv3v67uh3dze7xwwhtnz4faxid.onion
URLs
Leak Site


In a comprehensive analysis of ransomware victims across 45 countries, the United States emerges as the most heavily impacted nation, reporting a staggering 46% victim updates in the past week. The following list provides a breakdown of the number and percentage of new ransomware victims per country, underscoring the persistent and concerning prevalence of ransomware attacks, with the USA particularly susceptible to these cybersecurity threats.

Name of the affected CountryNumber of Victims
Afghanistan
              0.45%
Belgium
              0.90% 
Brazil
              1.36% 
Canada
              4.98% 
Chile
              0.45% 
China
              0.90% 
Colombia
              0.45% 
Croatia
              0.45% 
Czech Republic
              0.45% 
Denmark
              0.45% 
Egypt
              0.90% 
France
              4.07% 
Germany
              5.43% 
India
              4.07% 
Indonesia
              0.45% 
Ireland
              0.45% 
Island
              0.45% 
Israel
              0.45% 
Italy
              3.17% 
Japan
              0.45% 
Lebanon
              0.45% 
Malaysia
              0.45% 
Mexico
              1.81% 
Mozambique
              0.45% 
Namibia
              0.45% 
Netherlands
              0.90% 
Nigeria
              0.45% 
Peru
              0.45% 
Poland
              0.45% 
Singapore
              0.45% 
Slovakia
              0.45% 
South Africa
              0.45% 
South Korea
              0.45% 
Spain
              3.17% 
Sri Lanka
              0.45% 
Sweden
              0.90% 
Switzerland
              0.90% 
Taiwan
              0.90% 
Thailand
              0.90% 
Turkey
              0.90% 
UAE
              0.90% 
UK
              4.98% 
Ukraine
              0.45% 
USA
            46.15% 
Vietnam
              0.90% 

Worldwide Ransomware Victims Chart

Upon further investigation, it has been identified that ransomware has left its mark on 20 different industries worldwide. Notably, Manufacturing bore the brunt of the attacks in the past week, accounting for 20% of victims. There are a few key reasons why the manufacturing sector is a prime target for ransomware groups

  • High Disruption Potential: Manufacturing relies heavily on interconnected systems and just-in-time production. A ransomware attack can grind operations to a halt, causing significant financial losses due to production delays and lost revenue. This pressure to get back online quickly can make manufacturers more willing to pay the ransom.
  • Vulnerable Legacy Systems: Many manufacturers use legacy control systems (OT) that haven't been updated for security. These older systems often lack robust security features, making them easier targets for attackers to exploit.
  • Limited Cybersecurity Investment: Traditionally, cybersecurity might not have been a top priority for some manufacturers compared to production efficiency. This lack of investment in security awareness training and robust security protocols leaves them exposed.
  • Valuable Data: Manufacturing facilities often hold valuable intellectual property (IP) and trade secrets. Ransomware groups may not only disrupt operations but also threaten to leak this sensitive data if the ransom isn't paid.
  • Success Breeds Success: The high payout potential from past attacks on manufacturers incentivises ransomware groups to continue targeting them.

The table below delineates the most recent ransomware victims, organised by industry, shedding light on the sectors grappling with the significant impact of these cyber threats.

Name of the affected Industry
Victims Count (%)
Agriculture
              0.45
Business Services
            12.67
Construction
              6.79
Consumer Services
              3.62
Education
              4.98
Energy, Utilities & Waste Treatment
              0.45
Finance
              4.07
Government
              3.17
Healthcare
              8.14
Hospitality
              4.07
IT
              6.33
Legal Services
              3.17
Manufacturing
            20.36
Media & Internet
              0.90
Metals & Mining
              0.45
Organisations
              3.17
Real Estate
              0.45
Retail
              9.95
Telecom
              2.71
Transportation
              4.07

Industry Wide Ransomware Victims Chart
Details