H0lyGh0st Ransomware: North Korea’s New Weapon

by

July 18, 2022

Kim Jong-Un and his North Korean cronies have created a new cyber threat development group called H0lyGh0st (or DEV-0530). Their goal is to target and infect small-to-medium-sized businesses with nasty ransomware variants (also called H0lyGh0st) for financial gain.

Here’s what you need to know:

Discovery

The team at Microsoft’s Threat Intelligence Center (MSTIC) first discovered H0lyGh0st towards the end of June 2021. Since then the ransomware group has been targeting organizations around the world and its reach has been growing.

How does H0lyGh0st work?

Just like most ransomware. Once they’ve tricked someone into installing it, or breached your system through other various means, the ransomware encrypts everything it finds with the file extension “.h0lyenc.”

After encrypting the files, the group sends the victim a message demanding payment in Bitcoin, as well as a sample of their files as proof. They also send the victim a link to their “.onion” site where the victim can arrange payment via a contact form.

H0lyGh0st uses double extortion on their victims. First by demanding a payment to decrypt the victims’ files and then again by threatening to release the files publicly if they don’t receive payment.

Variants and More

According to the MSTIC there are two versions of H0lyGh0st’s ransomware:

  • SiennaBlue (HolyRS.exe, HolyLocker.exe, and BTLC.exe)
  • SiennaPurple (BTLC_C.exe)

SiennaBlue is written in the open-source Go programing language. SiennaPurple is written in C++. The SiennaPurple variant isn’t as robust as its counterpart. SiennaBlue has a variety of features ranging from multiple encryption options, string obfuscation, public key management, and support for internet and intranet.

How to Protect Yourself

Microsoft recommends you buy all of their BRAND new MSSP products because…of course they do.  However, other next-generation antivirus products (like Blackberry Protect and Cybereason) offer similar protection.

Beyond that the basic defensive positions apply: 

  • Proper firewall policies
  • Security awareness training for end-users
  • Regular back-ups

Conclusion

That’s about all we’ve got for you right now. If there’s any new information released we’ll publish it here on the blog.  Otherwise, you can read more about H0lyGh0st here on Microsoft’s site.

Carl Keyser is the Content Manager at Integris.

Keep reading

Bridging the Gap between Automation and Innovation

Bridging the Gap between Automation and Innovation

Automation and Innovation. Some people might say those two words cancel each other out. Yet, I believe these two concepts can create capacity for each other—if your business leverages the free time automation creates to foster innovation. Automation can be...

Why Is My Laptop Draining So Fast?

Why Is My Laptop Draining So Fast?

Before You Replace Your Laptop Battery, Try These Fixes First Stuck with a laptop that’s running out way before it’s standard 8-10 hours of run time? Don't throw it out just yet.  Try these quick fixes to extend its life: Reduce your screen brightness If possible,...