RansomHub Rises: The Comedic Misadventures of Cybercrime’s Overachieving Ransomware Group

RansomHub ransomware-as-a-service is wreaking havoc, exploiting patched vulnerabilities in Microsoft Active Directory. With over 600 global targets since February 2024, RansomHub’s cybercrime spree is like a never-ending buffet—everyone’s invited, but only RansomHub gets the dessert. They’re the most active ransomware group in 2024, and they’re not taking reservations.

Pro Dashboard

Hot Take:

**_The RansomHub gang is like a soap opera villain who just won’t quit, constantly finding new ways to stir up trouble and recruit a cast of equally nefarious characters. They’re the cybercriminal equivalent of that one annoying mosquito you can’t seem to swat, even after you’ve patched all your screens (and your software)._**

Key Points:

– RansomHub has targeted over 600 organizations globally, making it the most active ransomware group in 2024.
– Leveraged now-patched flaws in Microsoft’s Active Directory and Netlogon protocol to escalate privileges.
– Recruited affiliates from rival gangs LockBit and BlackCat to bolster operations.
– Utilized a “brute-force attack” with 5,000 usernames and passwords for unauthorized network access.
– Exploited existing vulnerabilities to gain control of domain controllers and conduct lateral movement.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?