Since its emergence in February 2024, RansomHub has quickly become one of the most prominent ransomware groups, surpassing established players like LockBit. This article explores RansomHub’s origins, tactics, and some of its most significant attacks.
RansomHub: Origins and Structure
RansomHub first appeared on the cybercrime scene in early 2024, announcing itself as a new ransomware-as-a-service (RaaS) affiliate program on the RAMP cybercriminal forum. The group is believed to be an evolved iteration of the Knight ransomware, also known as Cyclops 2.0.
RansomHub operates on a RaaS model, where the core group develops the ransomware and leases it to affiliates who carry out attacks. What sets RansomHub apart is its unique payment structure – affiliates receive 90% of the ransom, paying only 10% to the core group.
More importantly, the money is sent to the affiliate first, addressing trust issues in the ransomware community following recent exit scams by other groups.
RansomHub: Tactics and Techniques
RansomHub employs a range of sophisticated tactics:
- Malware Development: The ransomware is written in Golang and C++, supporting Windows, Linux, ESXi, and MIPS architectures.
- Exploitation: Recent attacks have leveraged the ZeroLogon vulnerability (CVE-2020-1472), allowing attackers to take over domain controllers.
- Remote Access: Tools like Atera and Splashtop are used for remote access, while NetScan is employed for network reconnaissance.
- Pre-Encryption Steps: Before deploying ransomware, attackers use command-line tools like iisreset.exe to stop Internet Information Services (IIS).
- Data Exfiltration: RansomHub employs double extortion tactics, stealing data before encryption to increase pressure on victims.
- Affiliate Recruitment: The group actively recruits affiliates, particularly former members of disrupted ransomware operations like ALPHV/BlackCat.
Notable Attacks
RansomHub has been involved in several high-profile attacks since its inception:
- Change Healthcare: One of the earliest and most impactful attacks attributed to RansomHub was against Change Healthcare, a major U.S. health payment processing company. On February 21, 2024, RansomHub claimed to have stolen four terabytes of sensitive data, including personal information of U.S. military personnel, medical records, and financial information. This attack followed a previous incident where Change Healthcare had paid a $22 million ransom to the ALPHV/BlackCat group. The RansomHub attack is believed to be related to disgruntled affiliates from the BlackCat group who felt cheated out of their share of the ransom.
- Christie’s Auction: In April 2024, RansomHub targeted Christie’s, a renowned British auction house. The attack led to the theft of sensitive client information affecting potentially 500,000 clients. Christie’s took immediate measures to secure their network and engaged external cybersecurity experts. The stolen data was later claimed to have been sold on RansomHub’s dark web auction platform, highlighting the group’s aggressive data-theft extortion tactics.
- UnitedHealth Group: RansomHub’s attack on UnitedHealth-owned prescription processor Change Healthcare caused massive disruption in the U.S. healthcare system for weeks, preventing many pharmacies and hospitals from processing claims and receiving payments. UnitedHealth paid a $22 million ransom to a Russian-speaking cybercrime group behind the attack, underscoring the severe impact and high stakes of RansomHub’s operations.
Growth and Impact
RansomHub’s growth has been remarkably fast. Between February and April 30, 2024, the group claimed forty-five victims (and counting!) across multiple countries, with the majority (13) in the US, followed by Brazil (6), and the UK, Italy, and Spain (3 each).
By June 2024, RansomHub had become the most prevalent ransomware group, responsible for 21% of published attacks according to ransomware “shame sites”. This rapid ascent is partly attributed to the decline of other major ransomware groups like ALPHV/BlackCat and LockBit3 following law enforcement actions.
Other Threat Actors
RansomHub’s emergence and rise have led to speculation about its connections to other well-known ransomware groups. The timing of ALPHV’s disappearance and RansomHub’s appearance, along with the new affiliate prepayment model, has led many researchers to suspect that RansomHub could be a rebrand of ALPHV.
This suspicion is further supported by the technical similarities between the RansomHub encryptor and the ALPHV encryptor, as well as the use of similar tools and tactics.
RansomHub’s ability to attract affiliates from other ransomware groups, particularly those disgruntled with their previous arrangements, suggests a strategic effort to consolidate talent and resources within the cybercriminal ecosystem. This consolidation has likely contributed to RansomHub’s fast growth and effectiveness in executing high-profile attacks.
Cybersecurity Issues
RansomHub’s emergence presents a whole range of significant challenges for cybersecurity professionals:
- Evolving Tactics: The group’s use of both established vulnerabilities (like ZeroLogon) and new techniques requires constant updated defense strategies.
- Affiliate Model: The attractive payment structure for affiliates may lead to an increase in overall ransomware attacks.
- Double Extortion: RansomHub’s use of data theft alongside encryption increases the pressure on victims and complicates incident response.
- Rapid Adaptation: The group’s quick rise to prominence demonstrates the ransomware ecosystem’s ability to quickly fill voids left by law enforcement actions against other groups.
Prevent Cybercrime with BlackFog ADX
BlackFog provides a solution with a focus on preventing data exfiltration with ADX technology. This next generation cybersecurity solution has been designed to help organizations protect themselves from ransomware attacks and extortion 24/7, without the need for human intervention.
Don’t wait for the next ransomware attack wave; take proactive action now and secure your most valuable assets.
Share This Story, Choose Your Platform!
Related Posts
Infostealers Explained: The Hidden Gateway to Ransomware
Infostealers compromise credentials and open the door to ransomware. Learn what they are, how they work, and key steps to keep your business safe.
Data Poisoning Attacks: How Hackers Target AI-Driven Business Systems
Data poisoning corrupts the information resources that AI systems rely on. Learn how this growing threat works, why it matters and what steps your business can take to defend against it.
What is Cyber Resiliency and Why Does it Matter in 2025?
Discover why cyber resiliency is vital in 2025 as firms face complex threats. Learn how businesses can adapt, recover and protect trust.
The Interlock Ransomware Problem Security Teams Can’t Ignore
Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.
Effective Data Security Management: Strategies and Best Practices
What must firms do to develop an effective data security management strategy? Here are some key best practices to follow.
What is Data Loss Prevention? | A Complete Guide to DLP Security
Learn everything you need to know about what data loss prevention is and how to implement it in this comprehensive guide.