Termite Ransomware: The Silent Invader

Termite ransomware, active since at least late 2024, targets high-profile organizations. Recent victims include Blue Yonder and Zschimmer & Schwarz, highlighting its broad reach and impact.
Termite Ransomware: The Silent Invader
Table of Contents
    Add a header to begin generating the table of contents

    Overview

    Termite Ransomware is a relatively new and rapidly evolving ransomware group first identified in late 2024. While its origins remain unclear, it’s believed to be connected to the Babuk ransomware group, leveraging modified Babuk code. Termite’s operations demonstrate a blend of traditional ransomware techniques and modern strategies aimed at maximizing disruption and financial gain, focusing on data theft, extortion, and encryption. Its attacks have already impacted high-profile organizations across various industries globally, establishing it as a significant threat in the evolving ransomware landscape. Speculation exists regarding potential links to other prominent groups like Cl0p, based on overlapping victim targets and exploited vulnerabilities.

    Known Aliases

    “Termite” is the only known alias of this ransomware.

    Country of Origin

    The country of origin for Termite Ransomware is unknown.

    Most Recent Attacks involving Termite Ransomware

    • Blue Yonder (November 2024): This is the most notable attack attributed to Termite. The attack caused significant operational disruptions for several major companies that utilize Blue Yonder’s supply chain management solutions. Termite claimed to have exfiltrated 680GB of sensitive data. A notable aspect of this attack is the simultaneous listing of Blue Yonder as a victim by both Termite and the Cl0p ransomware group, fueling speculation about potential connections between the two. Blue Yonder later clarified that this attack was unrelated to a separate vulnerability in Cleo software, which was exploited by Cl0p.
    • Zschimmer and Schwarz (January 30, 2025): Zschimmer and Schwarz, a company developing and producing high-performance chemical auxiliaries for various industries, was also victimized by Termite. The exact size of the data leak in this incident remains unknown.

    MITRE ATT&CK Tactics and Techniques Used by Termite Ransomware

    TacticTechniqueIDDescription
    ExecutionUser ExecutionT1204.002Executes malicious code using a user’s account.
    Defense EvasionIndicator Removal on HostT1070.004Removes artifacts from the compromised system to evade detection.
    DiscoveryFile and Directory DiscoveryT1083Searches for files and directories to identify targets for encryption or exfiltration.
    DiscoveryNetwork Share DiscoveryT1135Discovers network shares to spread the ransomware laterally.
    Lateral MovementRemote ServicesT1021Uses remote services (like RDP or SMB) to move laterally within the network.
    Privilege EscalationValid AccountsT1078Uses compromised accounts to elevate privileges.
    Command and ControlIngress Tool TransferT1105Transfers tools or payloads to the compromised system.
    ImpactData Encrypted for ImpactT1486Encrypts data to render it inaccessible.
    ImpactInhibit System RecoveryT1490Prevents system recovery by deleting shadow copies and clearing the Recycle Bin.

    Methods of Attack/Infiltration of Termite Ransomware

    Termite’s initial access methods are believed to include:

    • Phishing Campaigns: Targeting individuals within organizations to gain initial access.
    • Exploitation of Software Vulnerabilities: Leveraging known or zero-day vulnerabilities in software to compromise systems. This includes documented exploitation of vulnerabilities in Cleo file transfer software (CVE-2024-50623 and CVE-2024-55956), although the Blue Yonder attack was later clarified to be unrelated to this specific vulnerability.
    • Use of Stolen Credentials: Potentially using compromised credentials to gain unauthorized access.

    Malware/Ransomware Strain(s) Used by Termite Ransomware

    The primary ransomware used by Termite is a modified version of the Babuk ransomware.

    Related Posts