Security

SharpRhino malware targets IT admins – Hunters International gang suspected

Fake Angry IP Scanner will make you furious - or maybe remind you of how the Hive gang went about its banal business


The latest malware from upstart criminal gang Hunters International appears to be targeting network admins, using malicious code disguised as the popular networking tool Angry IP Scanner.

The software nasty, dubbed SharpRhino on account of its use of C#, is hidden in a fake version of the scanning tool posted to typo-squatted websites – which to the casual eye look legit but have slightly misspelled URLs to trick victims into running the code.

The malware was discovered by Scottish security shop Quorum Cyber and appears to have been around since mid-June.

The trojan’s executable is named "ipscan-3.9.1-setup.exe" and consists of a 32-bit Nullsoft installer containing a password-protected 7z archive. The malware seekers at Quorum Cyber identified the password to the archive, and once inside found an application named Microsoft.AnyKey.exe.

When run, SharpRhino alters the Run\UpdateWindowsKey registry to direct to the Microsoft.AnyKey.exe file, which was adapted from a Microsoft Visual Studio 2019 Node JS tool. It also sets up to chat with two command and control systems: The first houses the initial payload and comms channels back to the operator, while the other is used to dig into the target's machine and establish persistence.

Once its malware is firmly embedded in the system, Hunters International can use its remote access to spread out across the network and from there deploy more malware and info-stealing code. SharpRhino uses a Rust-based encryptor to bork files as .locked – apart from a single README file called Contact Us.txt, which directs the victim to a ransomware payment page on the Tor network.

New kids on the block or same old scumbags?

Based on the code, the tactics it uses, and the vector of attack, Quorum Cyber’s analysts strongly suspects this malware is the work of Hunters International – a ransomware-as-a-service gang that was first spotted in October of last year.

Since then the gang has risen to the top ten most detected ransomware mobs. Its speedy rise – and its use of the Hive ransomware in the early days – lead many to suspect that the Hunters are simply the Hive crew rebranded. This particular batch of ransomware shares about 60 percent of its code with Hive's original malware.

The crew is also fond of the double extortion attack. First data is copied and stolen – a process that can take weeks to help crims avoid detection – before corporate servers are encrypted. If the victim doesn't pay for the decryption key, crims turn to threats the information will be made public if payment isn’t forthcoming. Blackmail tactics of that sort have also been employed by Hive.

Hunters isn't known to be a triple extortionist, yet – so hasn't been recorded trying to extort money from a target's customers using the purloined data.

"So far, Hunters International has claimed responsibility for 134 attacks in the first seven months of 2024," wrote Quorum Cyber threat intelligence analyst Michael Forret.

"The group has positioned itself as a Ransomware-as-a-Service (RaaS) provider, thereby enabling other potentially less sophisticated threat actors with tooling to conduct additional attacks. Being a RaaS provider is highly likely a main cause for their fast rise to notoriety."

Tellingly, but not unusually in the ransomware game, Hunters International has claimed responsibility for attacks around the world – except for Russia. Ransomware operators operate on the presumption that if they don't go after Russian targets then that country's authorities will leave them alone, or even rescue them from foreign custody. ®

Send us news
Post a comment

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Medusa ransomware gang demands $2M from UK private health services provider

2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident'

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining

These crooks have no chill

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process