Recommendations for Countering Against Phobos Ransomware

  |  Source: 
Critical Infrastructure
Emergency Response

Recommendations for Countering Against Phobos Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA), in conjunction with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has released a comprehensive analysis of the Phobos ransomware gang. Phobos, identified as a ransomware-as-a-service (RaaS) operation since May 2019, has systematically targeted state, local, tribal, and territorial (SLTT) governments, as well as critical infrastructure sectors. Through sophisticated phishing campaigns and exploiting vulnerabilities in Remote Desktop Protocol (RDP) services, Phobos actors have managed to compromise a range of critical infrastructure entities, including municipal and county governments, emergency services, and public healthcare systems, ransoming millions of dollars.

Phobos operators demonstrate a high level of technical proficiency, leveraging a combination of open-source tools like Smokeloader, Cobalt Strike, and Bloodhound for reconnaissance, gaining initial access, and executing attacks. The ransomware employs various tactics for initial infiltration, including phishing to drop hidden payloads and scanning for vulnerable RDP ports using tools like Angry IP Scanner. Upon gaining access, Phobos actors deploy executables for privilege escalation and leverage sophisticated tools to bypass network defenses, maintain persistence, and escalate privileges within compromised networks. This includes modifying system firewall configurations and using Windows API functions to steal tokens and create new processes. Data of interest are gathered including various financial, technical, and documents as well as databases associated with password management software.

For cybersecurity detection engineers, the Phobos ransomware's methodology underscores the need to focus on detecting initial access attempts, particularly via phishing and vulnerable RDP ports. Monitoring for the deployment and execution of known executables associated with Phobos, such as 1saas.exe or cmd.exe, could be crucial in early detection. Understanding the exfiltration techniques employed, including the use of WinSCP and Mega.io, can aid in preventing data breaches. Implementing the outlined detection mechanisms against these specific TTPs could significantly mitigate the threat posed by Phobos ransomware and similar RaaS operations.

Get trending threats published weekly by the Anvilogic team.

Sign Up Now