Security researchers have discovered a ransomware campaign from a group called Monti, may be the name derived since it relies almost entirely on leaked Conti code to launch attacks.
The Monti group emerged with a round of ransomware attacks and was able to successfully exploit the Log4Shell vulnerability to encrypt 18 BlackBerry user hosts and 21 servers.
The threat actor initially obtained access to the client’s VMware Horizon Connection Broker server via Log4Shell exploitation. After entering the client’s environment, it installed the Google Chrome browser and used it to download attack tools to the server.
The threat actor also downloaded and installed two remote monitoring and maintenance (RMM) agents, AnyDesk and Action1 (Which is not used in any of previous ransomware attack). It used these agents to establish persistence within the network and to facilitate additional remote access.
The attackers also used tooling they’d brought into the environment to dump credentials from memory and scan the network. They used Microsoft Windows built-in RDP to connect to other servers, access data files on network shares, and eventually to deploy the “MONTI” strain of ransomware. The goal of this activity was to encrypt multiple hosts within the network including Veeam-based backups.
- Action1 RMM
- Anydesk RMM
- Avast Anti-rootkit driver
- Veeam Get Creds
The attackers used two well-known temporary file transfer websites dropmefiles.com[.]ua and temp[.]sh to bring tools into the network and to exfiltrate data.Upon execution, the malware encrypts files on disk, adds a “.PUUUK” extension to affected files’ names.
The researchers said they believe Monti lifted Conti’s infrastructure when it was leaked last spring, during February and March.
As additional ransomware-as-a-service (RaaS) solution builders and source code become leaked, either publicly or privately, we could continue to see these doppelganger-like ransomware groups proliferate.
This research documented by researchers from BlackBerry Threat Intelligence team.
Indicators of Compromise
MONTI” payload SHA-256 hashes:
Veeam Credential Dumper SHA-256 hashes: