On 17th November 2022, Microsoft security threat intelligence (MSTC) published a blog on threat group DEV-0569 finding new ways to deliver royal ransomware.
The threat groups gain initial access by using malicious links via phishing, Malvertising, blog comments, contact forms, and fake installers, the links lead to sites and download malicious software posing as legitimate software, and the downloads contain signed MSI or VHD files (Bat Loader), then it executes PowerShell or batch script for the discovery, disabling AV, and delivery of additional payload.
The installers launch a PowerShell script and download nircmd utility, then allow the attacker to elevate privileges and deliver additional executables such as gozi trojan, vidar stealer which used telegram to receive command and control information, then the threat group performs staging and execution of the royal ransomware.
- Use Antivirus and EDR in all endpoints.
- Take regular backups of end devices to reduce the impact.
Create rules based on known indicators of threat groups in the SIEM (Security incident event management) tool for detection of threat activity
Indicators of Compromise of Royal Ransomware (IOCs)