Table of Contents
March 22, 2025
|
10m

Vice Society Ransomware Group


A dimly lit school hallway ends with an ominous glowing message "WE HAVE YOUR FILES," symbolizing Vice Society ransomware attacks on the education sector.

Vice Society is a financially motivated ransomware group known for its intrusion, exfiltration, and extortion tactics. Emerging in the summer of 2021, the group has quickly gained notoriety for its disproportionate targeting of the education sector, particularly K-12 institutions and higher education. Unlike many ransomware operations that employ a Ransomware-as-a-Service (RaaS) model, Vice Society conducts its own intrusions and ransomware deployments. They utilize a double-extortion approach, stealing sensitive data before encrypting systems and threatening to publish it on their dedicated leak site if a ransom is not paid. This profile provides a comprehensive overview of Vice Society's origins, tactics, targets, and attack campaigns, along with defense and detection strategies for security professionals.

Origins & Evolution

Vice Society first appeared on the threat landscape in the summer of 2021. While the group's exact origins remain unconfirmed, there is strong evidence to suggest they are Russian-speaking. Unlike many other prominent ransomware groups, Vice Society does not operate as a RaaS. They do not recruit affiliates; instead, they handle all aspects of their operations, from initial intrusion to ransomware deployment and data exfiltration.

Initially, Vice Society relied on existing ransomware families, particularly HelloKitty (also known as FiveHands) and Zeppelin. This suggested a lower level of initial sophistication, potentially purchasing or otherwise acquiring existing ransomware payloads rather than developing their own. However, more recent activity indicates an evolution in their capabilities. Trend Micro reported in 2023 that Vice Society has developed its own custom ransomware builder and adopted stronger encryption methods. This evolution points to increased investment in their operations and a potential shift towards greater independence and sophistication. There's also been some evidence of their operations evolving to become a RaaS model.

There are suggestions and reports that Vice Society operators are now potentially associated with or using the Rhysida ransomware. This is based on strong technical overlaps in their TTPs (Tactics, Techniques, and Procedures), similarities in target industries, and a timeline that shows Vice Society's activity decreasing around the time of Rhysida's emergence.

Tactics & Techniques

Vice Society employs a range of tactics, techniques, and procedures (TTPs) throughout their attack lifecycle, often leveraging known vulnerabilities and "living off the land" techniques to evade detection.

  • Initial Access:

    • Exploiting Internet-Facing Applications: Vice Society commonly targets vulnerabilities in internet-facing applications, using compromised credentials or exploiting known exploits.

    • Phishing: While not their primary method, phishing emails with malicious attachments or links have been used. See an example of a spear phishing tactic.

    • Compromised Credentials: They leverage stolen or weak credentials to gain initial access.

  • Lateral Movement & Privilege Escalation:

    • Tools: Vice Society utilizes various tools for lateral movement and privilege escalation, including:

      • SystemBC: A proxy and remote access trojan (RAT).

      • PowerShell Empire: A post-exploitation framework.

      • Cobalt Strike: A penetration testing tool often abused by threat actors.

      • Mimikatz: A credential-dumping tool.

    • Techniques:

      • Windows Management Instrumentation (WMI): Abusing WMI for executing commands and moving laterally.

      • Tainting Shared Content: Modifying files on shared drives to compromise other users.

      • PrintNightmare Exploitation (CVE-2021-1675, CVE-2021-34527): Leveraging the PrintNightmare vulnerability for privilege escalation.

    • PortStarter: A backdoor written in Go, used for modifying firewall settings and opening ports.

  • Persistence:

    • Scheduled Tasks: Creating scheduled tasks to maintain access.

    • Registry Key Modification: Adding or modifying registry keys, including undocumented autostart keys (T1547.001).

    • DLL Side-Loading: Exploiting DLL side-loading vulnerabilities to execute malicious code.

  • Defense Evasion:

    • Masquerading: Disguising malware and tools as legitimate files.

    • Process Injection: Injecting malicious code into legitimate processes.

    • Evasion Techniques: Employing various techniques to evade automated dynamic analysis.

    • Disabling Security Tools: Attempting to disable antivirus software and delete system logs.

    • Aggressive Log Deletion: Removing RDP logs and registry entries, and clearing PowerShell console history.

      • Deleting temporary files.

  • Credential Access:

    • LSASS dumps (using comsvcs.dll and MiniDump).

    • NTDS dumps for cracking.

    • Kerberoasting (using PowerSploit's Invoke-Kerberoast).

  • Account Creation: Creating accounts that blend in as admin accounts.

  • Impact:

    • Data Encryption: Encrypting files and appending the ".v1cesO0ciety" extension (or variants like .v-s0ciety, .v-society for their custom-built ransomware).

    • Data Exfiltration: Stealing sensitive data before encryption for double extortion.

    • Account Access Removal: Changing victims' network account passwords to impede remediation efforts.

      • Domain-wide password changes to hinder remediation.

      • Attempting to deploy a PowerShell script to disable system recovery.

  • Data Exfiltration:

    • PowerShell scripts with hardcoded attacker IPs and wide-ranging keywords.

    • Suspected use of Rclone and MegaSync for uploading to cloud storage.

    • File compression tools.

  • Ransomware Toolkit Evolution:

    • Initially: HelloKitty/FiveHands and Zeppelin ransomware families.

    • Currently: Custom ransomware builder and stronger encryption methods, with indications of potential association with Rhysida ransomware.

Targets or Victimology

Vice Society exhibits a strong and disproportionate focus on the education sector, encompassing K-12 schools, colleges, and universities. This targeting preference is a defining characteristic of the group. They have listed dozens of schools on their data leak site, making them one of the most prolific attackers of educational institutions.

Beyond education, Vice Society has also targeted organizations in the following sectors:

  • Healthcare: Another frequently targeted sector, likely due to the sensitivity of patient data and the potential for operational disruption.

  • Manufacturing: Trend Micro reported detections of Vice Society activity in the manufacturing sector, particularly in Brazil.

  • Local Government: Has been targeted by the group.

  • Retail: Also been a victim.

  • Other: While less frequent, they have been known to target other industries opportunistically.

  • Small to Medium Businesses: They are known to target small to medium businesses.

Geographic Focus: Vice Society's attacks have been observed globally, with a concentration in:

  • United States: The most heavily targeted country.

  • United Kingdom: Another significant target.

  • Europe: Attacks have been reported in various European countries, including Spain, France, Germany and Italy.

  • Brazil: A notable target, particularly for attacks on the manufacturing sector.

  • Other: Detections have also been reported in countries like Argentina, Switzerland, and Israel.

Motivations: Vice Society is primarily financially motivated. Their double extortion tactics, combined with their targeting of organizations with a perceived ability to pay (even if the education sector is often underfunded), demonstrate this motivation. While their primary motive is money, they are known to carry out hacktivist activities.

Potential Impact:

  • Data Breach: Exfiltration of sensitive data, including student records, employee information, and proprietary research.

  • Operational Disruption: Encryption of critical systems can lead to significant downtime, impacting educational services, healthcare operations, and business processes.

  • Financial Loss: Ransom payments, recovery costs, and potential legal liabilities.

  • Reputational Damage: Loss of trust and damage to the reputation of targeted organizations.

Attack Campaigns

Several notable attack campaigns have been attributed to Vice Society, highlighting their impact, particularly on the education sector:

  • Los Angeles Unified School District (LAUSD): A high-profile attack that disrupted the second-largest school district in the United States. The attack resulted in data exfiltration and significant operational challenges.

  • San Francisco Rapid Transit System: An attack disrupting their operations.

  • Numerous K-12 Schools: Vice Society has consistently targeted smaller, less-defended K-12 schools, often listing them on their leak site.

  • Medical Institutions: Several Medical institutions have been attacked.

  • Timing with Academic Calendars: There's evidence suggesting Vice Society times its campaigns to coincide with the academic year, particularly targeting schools during periods of increased vulnerability (e.g., late summer/early fall).

Defenses

Defending against Vice Society requires a multi-layered approach encompassing proactive security measures, robust detection capabilities, and a well-defined incident response plan. Here are some key defense strategies:

  • Vulnerability Management and Patching:

    • Prioritize patching of internet-facing applications and systems. A patch management strategy is important to have.

    • Pay particular attention to vulnerabilities known to be exploited by Vice Society, such as PrintNightmare (CVE-2021-1675, CVE-2021-34527).

    • Implement a robust patch management process, including regular vulnerability scanning and prompt patching.

  • Credential Security:

    • Enforce strong password policies, including complexity requirements and regular password changes.

    • Implement multi-factor authentication (MFA) for all user accounts, especially for remote access and privileged accounts.

    • Regularly review and remove dormant or unnecessary accounts.

    • Implement the principle of least privilege, granting users only the access they need to perform their job duties.

  • Network Security:

    • Implement network segmentation to limit the lateral movement of attackers.

    • Deploy network intrusion detection and prevention systems (IDS/IPS) to monitor for malicious activity.

    • Use a firewall to restrict inbound and outbound traffic, particularly on sensitive ports.

    • Secure Remote Desktop Protocol (RDP) usage:

      • Limit RDP access to authorized users and systems.

      • Require MFA for RDP connections.

      • Monitor RDP logs for suspicious activity.

      • Disable unused RDP ports.

  • Endpoint Security:

    • Deploy endpoint detection and response (EDR) solutions to monitor for and respond to malicious activity on endpoints.

    • Use anti-malware software with real-time detection and automatic updates.

    • Enable attack surface reduction rules, particularly those related to PowerShell execution and credential theft.

    • Enable tamper protection to prevent attackers from disabling security features.

  • Data Loss Prevention (DLP):

    • Implement DLP solutions to monitor and prevent the exfiltration of sensitive data.

    • Configure DLP rules to detect and block the transfer of sensitive data to unauthorized destinations.

  • Security Awareness Training:

    • Conduct regular security awareness training for all employees, focusing on phishing awareness, safe browsing habits, and password security.

    • Educate users about the risks of social engineering and how to identify and report suspicious activity.

  • Incident Response Planning:

    • Develop and regularly test an incident response plan that includes procedures for containing, eradicating, and recovering from ransomware attacks.

    • Establish clear communication channels and roles and responsibilities for incident response. A cyber incident response plan is very helpful in that case.

    • Maintain offline, encrypted, and immutable backups of critical data.

    • Have a recovery plan to restore data and systems quickly in case of an attack.

  • Threat Intelligence:

    • Utilize threat intelligence feeds to stay informed about the latest TTPs used by Vice Society and other ransomware groups.

    • Incorporate threat intelligence into security controls to proactively block known indicators of compromise (IOCs).

  • Specific Recommendations for Educational Institutions:

    • Address Budgetary Constraints: Advocate for increased funding for cybersecurity within educational institutions.

    • Implement BYOD Policies: Develop and enforce strong Bring Your Own Device (BYOD) policies to manage the security risks associated with personal devices.

    • Prioritize Staff Training: Provide specialized cybersecurity training for IT staff and educators.

    • Leverage Endpoint Protection Platforms (EPP): Use EPPs with machine learning capabilities, behavioral analysis, and sandboxing capabilities to detect and mitigate attacks.

    • Ransomware Rollback Options: Use solutions that can roll back changes, and implement local caches of data file changes. An introduction to Ubuntu might be useful here.

Conclusion

Vice Society remains a significant threat, particularly to the education sector, due to its targeted attacks, evolving TTPs, and double-extortion tactics. Their initial reliance on existing ransomware families has given way to custom development and potentially a shift towards more sophisticated operations, including a possible association with Rhysida ransomware. While they are considered a "second- or third-tier" group in terms of sophistication, their prolific attacks on less-protected targets make them a persistent danger. Organizations, especially those in the education and healthcare sectors, must prioritize robust cybersecurity measures, including vulnerability management, credential security, network segmentation, endpoint protection, security awareness training, and incident response planning, to mitigate the risk posed by Vice Society and similar ransomware threats. Staying informed about their evolving tactics and leveraging threat intelligence is crucial for effective defense. Consider using a SIEM for effective defense.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

• Healthcare Data Breaches Surge to 183 Million Patient Records in Landmark Cybersecurity Report

• Russian Hackers Target Kazakhstan Diplomatic Files in Strategic Cyber Espionage Campaign

• Ransomware Payments Drop 35% in 2024 as Law Enforcement Disrupts Cybercrime

• PowerSchool Data Breach Exposes Student and Educator Information Nationwide

• AI-Driven Ransomware FunkSec Targets 85 Victims in December 2024

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe