INC Ransomware is a relatively new ransomware and data extortion operation that emerged in July 2023. This threat actor has quickly gained notoriety for its multi-extortion tactics, targeting a wide range of industries globally. Unlike some ransomware groups that focus on encrypting data, INC Ransomware emphasizes both data encryption and data theft. This double extortion approach significantly increases pressure on victims, as they face not only the disruption of their operations but also the threat of sensitive data being leaked publicly if the ransom is not paid. The group has even claimed to offer "security advice" to victims after payment, a likely deceptive tactic aimed at maximizing profits.
INC Ransomware first appeared in July 2023, making it a relatively recent entrant to the ransomware landscape. While the exact origins of the group remain unknown, the rapid deployment and sophistication of their attacks suggest a level of experience and planning. The group's initial tactics involved exploiting vulnerabilities in internet-facing services, particularly CVE-2023-3519 in Citrix NetScaler, as well as using spear-phishing campaigns to gain initial access.
There is strong evidence linking INC Ransomware to the leaked source code of Babuk ransomware. This connection is suggested by various researchers and has been observed to the level of code reuse, for example in the later Lynx variant (which appeared in July 2024).
The availability of INC Ransomware's source code on the criminal underground market (as early as March 2024) suggests that further variants based on this codebase are likely to emerge. This proliferation of variants poses an ongoing challenge to cybersecurity professionals. The Lynx variant shares a significant portion of its source code with INC, further suggesting a direct lineage. Analysis shows a 48% overlap in functions between the two ransomware families, with a 70.8% similarity in those shared functions.
INC Ransomware employs a multi-stage attack methodology, demonstrating a combination of technical expertise and social engineering skills. Their tactics, techniques, and procedures (TTPs) can be broken down into the following key stages:
Initial Access: INC Ransomware utilizes various methods to gain initial entry into victim networks. These include:
* Spear-phishing: Targeted emails containing malicious attachments or links are used to trick users into executing malware or providing credentials.
* Vulnerability Exploitation: Known vulnerabilities, such as CVE-2023-3519 (Citrix NetScaler) and CVE-2023-48788 (Fortinet EMS server SQL injection), are exploited to gain access to internet-facing systems.
* Compromised Credentials: Stolen or weak credentials may be used to gain access to systems.
Post-Exploitation and Lateral Movement: Once inside the network, INC Ransomware actors employ several techniques to move laterally and establish persistence:
* RDP (Remote Desktop Protocol)
* COTS (Commercial Off-The-Shelf) Tools: Legitimate software, such as NETSCAN.EXE
(network scanning), MEGAsyncSetup64.EXE
(file sharing), ESENTUTL.EXE
(database utility), and AnyDesk.exe
(remote desktop), are used for reconnaissance, data exfiltration, and maintaining access.
* LOLBINs (Living Off The Land Binaries): System tools like wmic.exe
and PSExec (often disguised, e.g., as winupd
) are used to execute commands and deploy the ransomware across multiple endpoints.
* Impacket Tools: Python tools like secretsdump.py, smbexec
, and wmiexec
are likely used for credential harvesting and lateral movement.
* Pass-the-Hash: Credentials are used to gain access to the network and then moved to other areas.
Privilege Escalation & Defense Evasion:
* BYOVD (Bring Your Own Vulnerable Driver): The group uses vulnerable drivers (e.g., "wnbios.sys") and tools like "disabler.exe" to escalate privileges and bypass EDR solutions.
* Safe Mode Boot: The --safe-mode
command-line argument forces a system reboot into Safe Mode, potentially bypassing security software.
* Service Creation: Persistence is achieved by creating a new service (e.g., "dmksvc") configured for automatic startup, pointing directly to the malware file.
Data Exfiltration:
* MEGA Sync: The MEGA file sharing service (MEGAsyncSetup64.EXE
) is a common tool used for data exfiltration.
* Restic: The Restic
backup utility has been observed being used for data exfiltration.
Impact (Encryption & Extortion):
* Partial Encryption: INC Ransomware employs partial encryption, combined with multi-threading, to speed up the encryption process. This approach can be more efficient and potentially less detectable than full disk encryption.
* File Extension: Encrypted files are typically appended with a specific extension (e.g., .lynx
in the case of the Lynx variant).
* Process Termination: The ransomware terminates specific processes related to databases, backups, email servers, and Java to ensure files are accessible for encryption and to hinder recovery.
* Volume Shadow Copy Deletion: Attempts are made to delete Volume Shadow Copies (VSS) to prevent data recovery.
* Recycle Bin Clearing: The recycle bin is emptied to remove traces of deleted files and hinder forensic investigation.
* Ransom Notes: Ransom notes (INC-README.TXT
, INC-README.HTML
) are dropped in every folder with encrypted files, directing victims to a TOR-based portal for communication. The HTML note is often printed to connected printers/fax machines.
* Command-Line Arguments: The ransomware supports various command-line arguments to customize its behavior, including targeting specific files/directories (-file
, -dir
), stopping processes (-sup
), encrypting network shares (-ens
), encrypting hidden drives (-lhd
), and enabling debug logging (-debug
). The -lhd
argument is particularly dangerous, as it can render the device unbootable.
INC Ransomware demonstrates a broad targeting strategy, impacting organizations across numerous industries and geographic locations. While seemingly indiscriminate in its selection of victims, the group tends to focus on organizations with the capacity to pay substantial ransoms and those possessing sensitive data.
Targeted Industries:
Healthcare
Education
Government
Technology
Industrial
Professional Services
Manufacturing
Construction
Retail
Real Estate
Architecture
Financial and Environmental Services
Geographic Focus:
United States: The US is the most frequently targeted country.
Europe: European countries are also heavily targeted.
Worldwide: Attacks have been observed globally, including in Singapore, among other countries.
The targeting of critical infrastructure sectors like healthcare and government highlights the group's willingness to cause significant disruption.
Several notable attack campaigns have been attributed to INC Ransomware:
Initial Emergence (July 2023): INC Ransomware was first observed in the wild, targeting a variety of organizations using double extortion tactics.
Citrix NetScaler Exploitation (Late 2023): The group actively exploited CVE-2023-3519 in Citrix NetScaler to gain initial access to victim networks.
Blue Yonder Attack (November 2024): A major attack on the supply chain vendor Blue Yonder disrupted operations for several prominent companies. INC Ransom claimed responsibility, alleging the exfiltration of 680GB of data. Interestingly, the Cl0p ransomware group also claimed responsibility for attacking Blue Yonder, fueling speculation about potential collaboration or shared vulnerabilities. Blue Yonder later clarified that the November 2024 breach (attributed to INC) was unrelated to a separate Cleo software vulnerability exploited by Cl0p.
Fortinet EMS Server Exploitation (March 2024): An attack leveraging CVE-2023-48788 on an internet-facing Fortinet EMS server allowed rapid deployment of RMM tools and subsequent data exfiltration.
Emergence of Lynx Variant (July 2024): A successor to INC, demonstrating code reuse and evolving tactics.
Protecting against INC Ransomware and its variants requires a multi-layered approach, combining preventative measures, detection capabilities, and incident response planning.
Generic Defense Strategies:
Patch Management: Prioritize patching internet-facing devices and systems, especially for known, actively exploited vulnerabilities. Maintain a comprehensive asset inventory.
Network Segmentation: Implement strong network segmentation to limit the lateral movement of attackers within the network. Isolate critical systems and restrict unnecessary communication.
Strong Authentication: Enforce strong, unique passwords and require multi-factor authentication (MFA) for all accounts, especially privileged accounts and remote access services.
Email Security: Implement advanced email security solutions to detect and block phishing emails, malicious attachments, and suspicious links. Train employees to recognize and report phishing attempts.
Endpoint Detection and Response (EDR): Deploy EDR solutions with behavioral analysis and threat intelligence capabilities to detect and respond to malicious activity on endpoints.
Data Backup and Recovery: Implement a robust backup and recovery plan, including regular backups stored offline or in a secure, isolated environment. Test backups regularly to ensure they can be restored effectively.
Principle of Least Privilege: Restrict user access to only the resources they need to perform their jobs. Regularly audit privileged accounts and limit their exposure.
Limit Software Installation: Prevent the installation of unauthorized software to trusted repositories to block BYOVD attacks.
File Share Protection: Implement stronger controls such as using Application Control or Software Restriction Policies.
RMM Tool Security: Use the measures mentioned above for authorized tools, and prevent any unauthorized traffic.
INC Ransomware-Specific Defenses:
Monitor for New Service Creation: Be vigilant for the creation of new services, especially those with unusual names or pointing to suspicious file paths (e.g., "dmksvc").
Restrict SSH Access: Limit and monitor SSH access, particularly from external networks, as it can be an initial access vector.
Detect Malicious Use of Legitimate Tools: Implement detection rules and behavioral analysis to identify the malicious use of legitimate tools like NETSCAN.EXE
, MEGAsyncSetup64.EXE
, AnyDesk.exe
, and Impacket tools.
Monitor for BYOVD Activity: Implement security controls to detect and prevent the loading of known vulnerable drivers.
INC Ransomware represents a significant and evolving threat to organizations worldwide. Its double extortion tactics, combined with its technical sophistication and use of readily available tools, make it a formidable adversary. The emergence of variants like Lynx, and the availability of INC's source code, suggest that this threat will continue to grow and adapt. Organizations must prioritize robust cybersecurity measures, including proactive threat hunting, vulnerability management, strong authentication, and employee training, to effectively defend against INC Ransomware and its evolving variants. A layered security approach, combining prevention, detection, and response, is essential to mitigate the risks posed by this persistent threat. Incident response planning is also key to recovery. Many orginizations are using SOAR to automate incident response.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
AI-Driven Ransomware FunkSec Targets 85 Victims in December 2024
Ransomware Payments Drop 35% in 2024 as Law Enforcement Disrupts Cybercrime
International Cybercrime Takedown: Four European Hackers Arrested in Phuket Ransomware Operation
Ransomware Actors Exploit SSH Tunneling to Target VMware ESXi Hosts
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.