Snatch ransomware, active since 2018, represents a persistent and evolving threat in the cybercrime landscape. Operating under the Ransomware-as-a-Service (RaaS) model, Snatch distinguishes itself through its adaptability, adoption of double-extortion tactics, and, notably, its ability to reboot compromised systems into Safe Mode to bypass security measures. This article provides a deep dive into Snatch ransomware, examining its origins, tactics, targets, attack campaigns, and defense strategies, aiding security professionals in combating this evolving threat. It also explores the controversy and confusion surrounding the "two Snatch" entities: the original ransomware group and the current data leak/extortion site.
Snatch ransomware first appeared in 2018, originally known as Team Truniger. The name "Truniger" is believed to be the online handle of a key member previously affiliated with the GandCrab RaaS operation. The GandCrab connection is significant, as that operation shut down in 2019, with some speculating it evolved into REvil. Many of Snatch's operations have been traced to Russian origins.
The name "Snatch" itself might be a reference to the movie of the same name, and the group's logo uses the acronym "S.N.Atch" (Security Notification Attachment) on their Telegram channel.
A key point of contention and evolution is the emergence of a second entity also calling itself "Snatch" (often referred to as "Snatch Team"). This group claims no connection to the original Snatch ransomware operations. They deny using a "conventional ransomware model" and state that the malware used in their operations is indirectly sourced from various affiliates and threat actors. They even explicitly state there is no malware referred to as "Snatch" in their operations.
This denial is, however, complicated by the fact that data from confirmed victims of the original Snatch ransomware appears on their extortion blog, alongside data apparently stolen by other threat actors. This has led to confusion and debate within the security community about the true relationship between the two entities. U.S. government agencies (FBI and CISA) acknowledge the current "Snatch Team's" claims but still connect them, albeit indirectly, to the original ransomware group.
The evolution of Snatch demonstrates a trend within the ransomware landscape: a shift from pure encryption towards data exfiltration and double extortion. The potential emergence of a "Snatch Team" focusing solely on data leaks could represent a further evolution, possibly an attempt to distance themselves from the legal ramifications of deploying encryption malware, or even an attempt to rebrand after operational security failures. This highlights the importance of understanding threat intelligence.
Snatch employs a variety of tactics, techniques, and procedures (TTPs) throughout its attack lifecycle, which can be mapped to the MITRE ATT&CK framework. Here's a breakdown of key stages:
Initial Access:
* Remote Desktop Protocol (RDP) Exploitation (T1133, T1021.001): A primary method is brute-forcing RDP credentials or exploiting vulnerabilities in exposed RDP services. This is a common tactic among many ransomware groups.
* Compromised Credentials (T1078): Snatch actors also acquire stolen credentials from criminal forums and initial access brokers (IABs). These credentials are often used to access VPNs and other remote access services.
* VPN services: Snatch establish RDP connections from bulletproof hosting services and through VPNs.
Execution:
* Command and Scripting Interpreter (T1059): Uses Windows Command Shell (cmd.exe
) and batch files (.bat
) for various tasks, including network enumeration, data exfiltration, and ransomware deployment.
* System Services: Service Execution (T1569.002): Leverages sc.exe to manipulate system services, potentially to disable security tools or establish persistence.
Persistence:
* Valid Accounts (T1078): Compromising administrator accounts is a key persistence mechanism. This allows Snatch actors to maintain access even after system reboots.
* C2 Communication: Snatch establishes connections over port 443 to a C2 server on a Russian bulletproof hosting service.
Defense Evasion:
* Masquerading (T1036): Uses ransomware executables with names that match the SHA-256 hash of the file, attempting to evade detection by security tools.
* Indicator Removal (T1070.004): Deletes deployed batch files to hinder incident response efforts.
* Modify Registry (T1112): Modifies registry keys, most notably to force the system to reboot into Safe Mode. A specific example is: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SuperBackupMan:Default:Service
. This key is associated with a persistence mechanism. Understanding keys is crucial for analysis.
* Impair Defenses (T1562): Attempts to disable antivirus software, specifically Windows Defender. Variations of a file named safe.exe
are often used in this process.
* Safe Mode Boot (T1562.009): This is a defining characteristic of Snatch. The ransomware reboots the infected system into Safe Mode (often with networking enabled) to bypass endpoint protection, which is typically inactive or operates with reduced functionality in Safe Mode.
Credential Access:
* Brute Force (T1110): Employs brute-force attacks against RDP services to guess credentials.
Discovery:
* Data from Local System (T1005): Searches for files and folders of interest before exfiltration.
* Time on System: Snatch have been observed to spend up to three months on a victim's system before deploying ransomware.
Lateral Movement:
* Remote Services (T1021): Uses compromised credentials to move laterally within the network via RDP, maximizing the impact of the ransomware deployment.
Command and Control:
* Application Layer Protocols (T1071.001): Uses HTTPS (port 443) for command and control communications, blending in with normal web traffic.
Exfiltration:
* Exfiltration Over C2 Channel (T1041): Exfiltrates stolen data to attacker-controlled servers, often using a dedicated malware component (e.g., Update_Collector.exe
).
Impact:
* Data Encrypted for Impact (T1486): Encrypts data using AES encryption. Encrypted files and folders have hexadecimal characters appended to their names. A ransom note (HOW TO RESTORE YOUR FILES.TXT
) is left on the system.
* Inhibit System Recovery (T1490): Deletes volume shadow copies using the command vssadmin delete shadows /all /quiet
. This prevents victims from easily restoring their files from local backups.
The "current" Snatch Team, while denying direct ransomware deployment, employs tactics centered around data exfiltration and extortion. They operate a leak site, communicating with victims through email, the Tox platform, and even spoofed phone calls. They may also purchase data stolen by other ransomware groups to increase pressure on victims. This type of activity shows the importance of security logging.
Snatch has targeted a broad range of industries and organizations, demonstrating a diverse victimology. Key sectors include:
Critical Infrastructure: Defense Industrial Base (DIB), Food and Agriculture, and Information Technology. This targeting of critical infrastructure aligns with broader trends in cybercrime and nation-state activity.
Other Sectors: Healthcare, retail, manufacturing, government entities, and entertainment.
Geography: Primarily targets North America and Europe, with the United States being the most affected country. However, victims have also been reported in South Korea, South Africa, and other regions.
The "current" Snatch Team's leak site features data from a wide range of victims, further illustrating the broad targeting strategy. This includes government-related entities and companies in diverse sectors.
Several notable attack campaigns have been attributed to Snatch, highlighting its impact and evolving tactics:
2019: Early attacks focused on IT providers in Saudi Arabia, employing supply chain compromises.
2021: The attack on the South African Department of Defence resulted in the leak of 1.6TB of sensitive data.
2022: An attack on the Florida Department of Veterans' Affairs led to data being posted on Snatch's extortion blog.
2023: Attacks on SsangYong Motor (South Korea) and Alinabal (US).
2023: Cybersecurity firm, Kraft Heinz investigated Snatch's claims of data theft.
Europol Operation: Snatch posted a message in response to a Europol operation targeting another ransomware group, claiming that they were not deterred and will continue their extortion practices.
These campaigns demonstrate Snatch's willingness to target high-profile organizations and its use of data leaks as a key component of its extortion strategy. The "current" Snatch Team's response to law enforcement activity further emphasizes their ongoing operations and disregard for legal consequences. Staying up-to-date with the new kali linux releases can help in understanding the tools used by attackers.
Combating Snatch ransomware requires a multi-layered approach, encompassing prevention, detection, and response. Key defense strategies include:
Remote Access Controls:
* Audit and strictly control remote access tools.
* Limit RDP usage and disable command-line/scripting activities via RDP.
* Implement strong authentication mechanisms for remote access, including multi-factor authentication (MFA).
Account Management:
* Review domain controllers for new or unrecognized accounts.
* Enforce the principle of least privilege.
* Implement strong password policies (long, complex passwords, no reuse, account lockouts).
* Require administrator credentials for software installation.
Credential Compromise Prevention:
* Implement time-based access controls.
* Avoid storing plaintext credentials.
* Enforce strong password policies (hashing, salting, no reuse, account lockouts, disable hints).
Multi-Factor Authentication (MFA):
* Require phishing-resistant MFA for all services, especially webmail, VPNs, and access to critical systems. This is a critical defense against credential-based attacks.
Patching and Vulnerability Management:
* Keep all systems and software up-to-date with the latest security patches.
* Prioritize patching known exploited vulnerabilities.
* Implement a robust vulnerability management program.
Network Segmentation:
* Implement network segmentation to limit the lateral movement of attackers within the network. This can contain the impact of a successful breach.
Monitoring and Detection:
* Implement network monitoring tools (EDR, SIEM) to detect abnormal activity, lateral movement, and data exfiltration.
* Configure alerts for suspicious registry modifications, especially those related to Safe Mode.
* Monitor for the creation of new user accounts, particularly privileged accounts.
* Monitor for the execution of suspicious commands (e.g., vssadmin delete shadows
). SIEM tools can help with monitoring.
Antivirus and Endpoint Protection:
* Install, update, and enable real-time detection for antivirus software.
* Ensure endpoint protection solutions are configured to detect and prevent ransomware behavior.
Backups:
* Maintain offline, encrypted, and immutable backups of critical data.
* Ensure backups cover the entire infrastructure and are regularly tested.
* Offline backups are crucial for recovery in the event of a successful ransomware attack.
Email Security:
* Implement email security gateways to filter out phishing emails and malicious attachments.
* Add email banners for external emails.
* Disable hyperlinks in received emails.
User Awareness Training:
* Educate users about the risks of phishing, social engineering, and ransomware.
* Train users to identify and report suspicious emails and activity.
Incident Response Plan:
* Develop and test a robust incident response plan specific to ransomware attacks.
* Ensure the plan includes procedures for containment, eradication, recovery, and communication. A strong CIRP is essential.
Validate Security Controls: Regularly test and validate security controls against the MITRE ATT&CK techniques used by Snatch. This includes simulating attacks to identify gaps in defenses. It's important to perform vulnerability assessments.
Snatch ransomware, and the potentially related "Snatch Team," represent a significant and evolving threat. Their tactics, ranging from RDP exploitation and Safe Mode reboots to data exfiltration and double extortion, require a comprehensive and proactive defense strategy. The ambiguity surrounding the relationship between the original ransomware group and the current data leak site adds complexity to attribution and threat analysis. Organizations must prioritize robust security controls, including strong authentication, network segmentation, endpoint protection, and regular backups, to mitigate the risk of Snatch and similar threats. Continuous monitoring, user education, and a well-defined incident response plan are essential for minimizing the impact of a successful attack. Staying informed about the latest TTPs and IOCs associated with Snatch, as well as collaborating with law enforcement and the security community, is crucial for defending against this persistent threat. The ongoing evolution of Snatch underscores the need for continuous adaptation and vigilance in the face of the ever-changing cybercrime landscape. SOAR can help with automation.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
Ransomware Payments Drop 35% in 2024 as Law Enforcement Disrupts Cybercrime
International Cybercrime Takedown: Four European Hackers Arrested in Phuket Ransomware Operation
AI-Driven Ransomware FunkSec Targets 85 Victims in December 2024
Ransomware Actors Exploit SSH Tunneling to Target VMware ESXi Hosts
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.