Welcome to another #ThreatThursday! This time we are looking at the Phobos Ransomware that has been attacking and extorting small and medium businesses for payouts averaging $54,700 according to CoveWare. As usual, we will consume Cyber Threat Intelligence and map it to MITRE ATT&CK. We will create an adversary emulation plan, share it on our Community Threats Github, and we will show how to Attack, Detect, and Respond to Phobos attacks.
Our Cyber Threat Intelligence for Phobos comes from a company that is familiar with ransomware incident response, BlackBerry. They posted a blog with procedure level data related to the tactics, techniques, and procedures (TTPs) observed during an incident they were working on. We consumed that report and mapped it to MITRE ATT&CK. You can find the MITRE ATT&CK Navigator layer on our Community Threats GitHub.
The adversary emulation plan comes in at 37 steps with some interesting procedures we will discuss in this section. If you want to follow along, download the Phobos plan from our Community Threats GitHub.
SCYTHE users will be able to import and run the threat by following these simple steps:
If you are not a SCYTHE user, you can manually execute some of the procedures from a command prompt. The Phobos ransomware was designed to run with elevated privileges. Running the horsemoney.exe that SCYTHE generates will automatically try to elevate privileges. If you are doing this manually, you will need to open an elevated command prompt. Here is what an end user would see if Phobos runs with non-admin privileges:
Privilege escalation is done by simply prompting the end user with UAC. SCYTHE does this through the automation language to determine if it is already running with administrative privileges:
If running with local administrator privileges, Phobos and the SCYTHE threat attempts to evade defenses by Impair Defenses: Disable or Modify System Firewall (T1562.004) and Inhibit System Recovery (T1490):
It then tries to persist when running as a local admin or a non-admin user by adding registry keys to execute files it copies to disk:
Lastly, it encrypts files with a .HORSEMONEY extension and opens the ransom note with a Signed Binary Proxy Execution: Mshta (T1218.005):
Instead of providing the same ransomware defenses you can see from the Ransomware Task Force, we want to cover note items observed from the Phobos ransomware that are not common from other ransomware we track:
To defend against these procedures, we recommend:
Phobos is a ransomware that goes after small and medium businesses with payouts averaging in the 5 figures. They are not very sophisticated compared to other threats we have covered in #ThreatThursday but do have some unique traits we focus on in this post. We consumed Cyber Threat Intelligence and mapped it to MITRE ATT&CK. We created and shared an adversary emulation plan on our Community Threats Github, and we covered how to Attack, Detect, and Respond to Phobos attacks. If you need help running a Purple Team Exercise or want a demo of SCYTHE, let us know.
This Threat Thursday post discusses active research by SCYTHE and other cited third parties into an ongoing threat. The information in this post should be considered preliminary and may be updated as research continues. This information is provided “as-is” without any warranty or condition of any kind, either express or implied.