New research exposes details of Gold Winter threat group that links it to the infamous Hades ransomware. Credit: Getty Images Researchers claim to have discovered the identity of the operators of Hades ransomware, exposing the distinctive tactics, techniques, and procedures (TTPs) they employ in their attacks. Hades ransomware first appeared in December 2020 following attacks on a number of organizations, but to date there has been limited information regarding the perpetrators.Today, researchers from the Counter Threat Unit (CTU) at Secureworks named Gold Winter as the threat group behind Hades ransomware. Furthermore, they shared details of notable traits in Gold Winter’s operations that distinguish it from other such threat groups and suggest it is a financially motivated, likely Russia-based “big game hunter” that seeks high-value targets, chiefly North American manufacturers.The findings are a result of incident response engagements carried out by Secureworks in the first quarter of 2021. “Some third-party reporting attributes Hades to the Hafnium threat group, but CTU research does not support that attribution,” the researchers wrote. “Other reporting attributes Hades to the financially motivated Gold Drake threat group based on similarities to that group’s WastedLocker ransomware. Despite use of similar application programming interface (API) calls, the CryptOne crypter, and some of the same commands, CTU researchers attribute Hades and WastedLocker to two distinct groups as of this publication.”Hades ransomware and Gold Winter’s unique TTPsThe analysis of Gold Winter revealed TTPs not associated with other ransomware families, the researchers explained, with some that show similarities but with unusual aspects added. CTU researchers found that Gold Winter: Names and shames victims but does not use a centralized leak site to expose stolen data. Instead, Tor-based Hades websites appear to be customized for each victim and each website includes a victim-specific Tox chat ID for communications. The use of Tox instant messaging for communications is a technique CTU researchers have not observed with other ransomware families.Is known to copy ransom notes from other high-profile families such as REvil and Conti, adding unique victim identifiers and replacing websites with contact email addresses. “Gold Winter may use lookalike ransom notes to confuse researchers or perhaps to pay homage to admired ransomware families,” researchers wrote.Replaces randomly generated five-character strings for the victim ID and encrypted file extension with words—e.g., cypherpunk. “Based on the definition of this term, perhaps the threat actors view their ransomware activity as a way to prompt organizations to improve their security,” researchers added.Uses two distinct initial access vectors: SocGholish malware disguised as a fake Chrome update and single-factor authentication VPN access.Deletes volume shadow copies using the “vssadmin.exe Delete Shadows/All/Quiet” command but uses a distinctive self-delete command with an unusual inclusion of a “wait for” command.Golden Winter likely a private ransomware group, not RaaS“Typically, when we see a variety of playbooks used around a particular ransomware, it points to the ransomware being delivered as ransomware-as-a-service (RaaS) with different pockets of threat actors using their own methods,”Marcelle Lee, senior security researcher, CTU-CIC at Secureworks, tells CSO. “We do not, however, think that is the case with Hades.” It is most likely that Gold Winter operates as a private ransomware group, she adds.It is also possible that Gold Winter has been organized by another threat group to throw law enforcement and researchers off their trail, Lee continues. “In that case, the threat actors may be intentionally trying to find ways to appear different. Alternatively, and most likely, the techniques could simply reflect an evolution in the threat group playbook, using new tactics and capabilities.” Lee advises using common ransomware defense and mitigation strategies for Hades: Implement an endpoint detection and response solution, multi-factor authentication on internet-facing devices and for user applications, and effective asset management. She also recommends effective patch management, subscription to curated threat intelligence to drive awareness of emerging threats, and having a tested incident plan and team in place. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe