Detecting and Defeating Cactus Ransomware: A Case Study
Cybersecurity4 min read

Detecting and Defeating Cactus Ransomware: A Case Study

24 Apr 202424 Apr 2024 darktrace.com

This article explores the emergence of Cactus ransomware and how cybersecurity experts successfully detected and neutralized the threat. Learn about its tactics and implications for cybersecurity.

Key Takeaways

  • 1."Our systems detected malicious activity within our client’s network, which led us to intervene before any significant data loss occurred," noted another Darktrace analyst.
  • 2.> "Our systems detected malicious activity within our client’s network, which led us to intervene before any significant data loss occurred," This event underscored the urgent need for real-time cyber defense mechanisms.
  • 3."CVE-2023-41266 allows for the generation of anonymous sessions, which is dangerous for organizations," explained a cybersecurity expert from Arctic Wolf.

In recent months, the rise of Cactus ransomware has become a topic of concern for cybersecurity specialists. Initially identified by Kroll Cyber Threat Intelligence Analysts in May 2023, this ransomware strain rapidly gained notoriety for targeting large organizations. The cybercriminals operating Cactus employ innovative tactics to infiltrate networks, which has prompted heightened vigilance in cybersecurity responses.

"Cactus ransomware was identified due to its distinct ransom note named ‘cAcTuS.readme.txt’," said a Kroll Cyber Threat Intelligence representative. "Encrypted files end with the ‘.cts’ extension, illustrating a new evolution in ransomware targeting strategies."

Cactus ransomware exploits vulnerabilities predominantly through compromised Virtual Private Network (VPN) services. Caught in the web of its tactics, once hackers breach a network, they utilize tools such as SoftPerfect Network Scanner and PowerShell commands to conduct internal scans. As part of the attack vector, these operatives identify user accounts and probe remote endpoints. "The sophistication is alarming; it shows how far ransomware affiliates are willing to go to stay undetected, employing an arsenal of tools to maintain persistence," noted a well-placed cybersecurity analyst.

"The sophistication is alarming; it shows how far ransomware affiliates are willing to go to stay undetected, employing an arsenal of tools to maintain persistence,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

Notably, their approach employs both legitimate remote access tools like Splashtop and malicious toolsets like Cobalt Strike. This duality allows them to subvert conventional security measures. "Ransomware must be versatile in its approach to ensure successful infiltration and spread, and Cactus exemplifies this strategy well," said an insider familiar with these methods.

"Ransomware must be versatile in its approach to ensure successful infiltration and spread, and Cactus exemplifies this strategy well,"

A recent report from Arctic Wolf in late November 2023 further detailed this emerging threat, explaining how actors were capitalizing on vulnerabilities within the Windows version of the Qlik business analytics platform. Specific vulnerabilities tracked as CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365 were exploited to gain unauthorized access to target networks. "CVE-2023-41266 allows for the generation of anonymous sessions, which is dangerous for organizations," explained a cybersecurity expert from Arctic Wolf. "The subsequent elevation of privileges via CVE-2023-41265 enables potentially catastrophic access."

"CVE-2023-41266 allows for the generation of anonymous sessions, which is dangerous for organizations,"

Darktrace, a leader in cybersecurity defense, took proactive measures against the Cactus ransomware threat. In November 2023, they monitored unauthorized access attempts that stemmed from the exploitation of Qlik’s vulnerabilities. "Our systems detected malicious activity within our client’s network, which led us to intervene before any significant data loss occurred," noted another Darktrace analyst. The company's robust surveillance capabilities allowed for the swift identification of Cactus, thereby averting potential operational disruptions.

"Our systems detected malicious activity within our client’s network, which led us to intervene before any significant data loss occurred,"

This event underscored the urgent need for real-time cyber defense mechanisms. "We’re constantly adapting our methods to meet evolving threats, and Cactus is a prime example of this necessity, highlighting the continuous arms race in cybersecurity," said. Darktrace's deputy team lead.

"We’re constantly adapting our methods to meet evolving threats, and Cactus is a prime example of this necessity, highlighting the continuous arms race in cybersecurity,"

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

One of the distinguishing features of Cactus ransomware is its double-extortion approach. This means that not only are organizations' files encrypted, but sensitive data is also stolen. "The fear of data leaks added pressure on victims to comply, forcing them to make difficult decisions in high-stakes environments," remarked a senior threat analyst.

"The fear of data leaks added pressure on victims to comply, forcing them to make difficult decisions in high-stakes environments,"

Impact and Legacy

In light of these developments, organizations are urged to assess their defenses and bolster them against such innovative threat methods. With the cyber threat landscape continuously evolving, the collaborative fight against ransomware must adapt. As one analyst succinctly put it, "Only through vigilance, education, and proactive measures can we hope to minimize the impact of threats like Cactus ransomware."

Looking Ahead

As the cybersecurity landscape grows increasingly complex, the lessons learned from the detection and response to Cactus ransomware can inform future preventative strategies. Understanding the techniques used by attackers is critical for developing robust defenses against emerging cyber threats. The efficacy of cooperation between cybersecurity firms and threat intelligence services may also play a pivotal role in enhancing resilience against such sophisticated attacks.

More Stories