Vice Society Ransomware: The Anti K-12 RaaS Syndicate

Vice Society, a prolific RaaS group, preys on schools and other institutions, deploying readily available ransomware and threatening data leaks unless ransoms are paid. Their global attacks highlight the vulnerability of educational systems.
Vice Society Ransomware: The Anti K-12 RaaS Syndicate
Table of Contents
    Add a header to begin generating the table of contents

    Overview:

    Vice Society is a prolific ransomware-as-a-service (RaaS) group notorious for its disproportionate targeting of the education sector, particularly K-12 institutions. Emerging in summer 2021, they have demonstrated a preference for opportunistic attacks, timed to coincide with the start and end of the US school year, exploiting vulnerabilities and compromised credentials to gain initial access. Unlike many RaaS groups that develop their own ransomware, Vice Society utilizes readily available strains like HelloKitty/FiveHands and Zeppelin, adapting them to their operations. Their attacks frequently involve double extortion, exfiltrating data before deploying ransomware and threatening to publish it publicly unless a ransom is paid; this data is often published on their Tor network leak site, which has undergone changes, including the addition of a blog and a “For Journalists” section. While their geographic origins remain unclear, their attacks have impacted organizations worldwide, with Unit 42 incident response data showing dwell times as long as six days and initial ransom demands exceeding $1 million, decreasing to as low as $460,000 after negotiations. They also target healthcare and non-governmental organizations (NGOs).

    Known Aliases:

    No aliases beyond “Vice Society” are publicly known.

    Country of Origin:

    The country of origin for Vice Society is currently unknown. Their attacks have a global reach, with victims across numerous countries.

    Known High-Profile Attacks of Vice City Ransomware:

    MITRE ATT&CK Tactics and Techniques Used by Vice City Ransomware:

    TacticTechnique IDTechnique Name
    Initial AccessT1190Exploit Public-Facing Application
    T1078Valid Accounts
    T1566Phishing
    ExecutionT1047Windows Management Instrumentation
    T1053Scheduled Task/Job
    T1059Command and Scripting Interpreter
    PersistenceT1543Modify System Process
    T1547Registry Run Keys/Startup Folder
    T1574DLL Side-Loading
    Privilege EscalationT1068Exploitation for Privilege Escalation
    Defense EvasionT1036Masquerading
    T1055Process Injection
    T1497Sandbox Evasion
    T1070Indicator Removal on Host
    T1112Modify Registry
    T1562Impair Defenses
    Credential AccessT1003OS Credential Dumping
    DiscoveryT1046Network Service Discovery
    T1482Domain Trust Discovery
    Lateral MovementT1021Remote Services
    T1080Taint Shared Content
    T1570Lateral Tool Transfer
    ExfiltrationTA0010Exfiltration
    T1020Automated Exfiltration
    T1041Exfiltration Over C2 Channel
    T1048Exfiltration Over Alternative Protocol
    T1567Exfiltration Over Web Service
    Command and ControlT1219Remote Access Software
    ImpactT1486Data Encrypted for Impact
    T1531Account Access Removal

    Vice City Ransomware Methods of Attack/Infiltration:

    Vice Society’s attacks typically begin with gaining initial access through various methods:

    • Exploiting vulnerabilities: They actively exploit publicly known vulnerabilities, notably the PrintNightmare vulnerability (CVE-2021-1675 and CVE-2021-34527).
    • Compromised credentials: They leverage stolen or compromised credentials to access networks.
    • Phishing: Phishing campaigns are used to deliver malicious payloads.
    • Once inside, they use a range of techniques for lateral movement and data exfiltration, including the use of tools like SystemBC, PowerShell Empire, and Cobalt Strike.
    • They also employ “living off the land” techniques, leveraging legitimate Windows tools like WMI to avoid detection.
    • They aim to escalate privileges, often gaining domain administrator access.

    Vice City Malware/Ransomware Strains:

    Vice Society is known to deploy:

    • HelloKitty/FiveHands ransomware: This was used in their early attacks and is notable for its AES-256 encryption and Linux variant. Encrypted files are appended with the extension “.v-society.”.
    • Zeppelin ransomware: Another ransomware strain deployed by the group. Encrypted files are appended with the extension “A1A-A80-4CD”. A ransom note titled “!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT” is left on the desktop.

    Related Posts