Security News > 2022 > June > Avos ransomware threat actor updates its attack arsenal

A new report from Cisco Talos Intelligence Group exposes new tools used in Avos ransomware attacks.
The threat actor provides a control panel for the affiliates, a negotiation panel with push and sound notifications, decryption tests, and access to a diverse network of penetration testers, initial access brokers and other contacts.
AvosLocker has already targeted critical infrastructures in the US, such as financial services, manufacturing and government facilities, according to the FBI. The Avos team do not allow attacks against post-Soviet Union countries.
Once all reconnaissance and lateral movements have been completed, the attackers use a legitimate software deployment tool named PDQ Deploy to proliferate the ransomware and other tools across the target network.
In the past, Avos attacks have also revealed the use of other tools: the PuTTY Secure copy client tool, Rclone, Advanced IP scanner and WinLister.
Figure B. Avos victims who do not pay have their data sold, as stated on the Avos website: "All data is FOR SALE. Contact us with your offers. We only sell data to third parties if the owner of said data refuses to pay."
News URL
https://www.techrepublic.com/article/avos-ransomware-updates-attack/
Related news
- Lee Enterprises newspaper disruptions caused by ransomware attack (source)
- Southern Water says Black Basta ransomware attack cost £4.5M in expenses (source)
- Qilin ransomware claims attack at Lee Enterprises, leaks stolen data (source)
- Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hunters International ransomware claims attack on Tata Technologies (source)
- Toronto Zoo shares update on last year's ransomware attack (source)
- Outsmarting Cyber Threats with Attack Graphs (source)
- Ransomware gang creates tool to automate VPN brute-force attacks (source)
- SANS Institute Warns of Novel Cloud-Native Ransomware Attacks (source)