#StopRansomware: Royal Ransomware

Description

FortiGuard Labs is aware that the Cybersecurity and Infrastructure Security Agency (CISA) recently released an advisory on Royal ransomware as part of its #StopRansomware effort. The advisory states that Royal ransomware compromised multiple organizations globally starting late 2022. The threat actor is known to use malware and dual-use tools to establish persistence, move laterally in the compromised networks and exfiltrate data from victims and ultimately lock victim machines for monetary gain.


Why is this Significant?

This is significant because CISA released the advisory for Royal ransomware for public awareness purposes. Due to its worldwide campaign starting last September, Royal has been attributed to many attacks in recent months and is gaining traction and severity due to observed attacks targeting critical infrastructure, such as Manufacturing, Communications, Healthcare and Public Healthcare (HPH), and Education verticals.


What is Royal ransomware?

Royal is a relatively new ransomware, having been around since at least the start of 2022. The group initially used Windows versions of Royal ransomware; however a Royal ransomware variant that can infect ESXi was observed in 2023. The Royal ransomware objective is to compromise victims' networks, exfiltrate information, deploy Royal ransomware for file encryption and ultimately extort money from the victims for file decryption and preventing data leaks.


According to the advisory, Royal ransomware infection vectors include emails, malvertising campaigns, Remote Desktop Protocol (RDP) compromise, exploiting internet-facing applications and gaining access from initial access brokers.


Tools used by Royal ransomware threat actor include Chisel for C2 communication, PsExec for lateral movement, AnyDesk, LogMeIn, and Atera, to establish persistence, and Cobalt Strike and Ursnif/Gozi malware to exfiltrate data.


Typically, Royal ransomware adds a ".royal" file extension to encrypted files and leaves "README.txt" as a ransom note.


FortiGuard Labs previously posted blogs on Royal ransomware. See the Appendix for a link to "Ransomware Roundup: Royal Ransomware" and "Royal Ransomware Targets Linux ESXi Servers".


What is the Status of Protection?

FortiGuard Labs has the following AV signatures in place for the available samples called out in the advisory:

  • W32/Chisel.A!tr
  • BAT/Agent.E949!tr
  • BAT/Agent.70c4!tr
  • PowerShell/Agent.FGA!tr
  • Riskware/Nsudo
  • W32/PossibleThreat

FortiGuard Labs has the following AV signatures in place for known samples of Royal ransomware:

  • W32/Ransom_Royal.FFBJFIM!tr
  • W32/Royal.D779!tr.ransom
  • W32/Royal.47AC!tr.ransom
  • W64/Royal.CF4E!tr.ransom
  • Linux/Filecoder_Royal.A!tr
  • W32/PossibleThreat

Network IOCs in the advisory are blocked by the FortiGuard Webfiltering client.