Pinchy Spider goes big game hunting with GandCrab

News by Doug Olenick

Pinchy Spider and its affiliated cyber-gangs are reacting to attempts to decrypt and defend against their flagship malware GandCrab by altering how the ransomware is deployed and recruiting new members to broaden the gang's cyber-skills.

Pinchy Spider and its affiliated cyber-gangs are reacting to attempts to decrypt and defend against their flagship malware GandCrab by altering how the ransomware is deployed and recruiting new members to broaden the gang’s cyber-skills.

New studies by Crowdstrike and Sophos Labs show Pinchy Spider is turning toward a "Big Game Hunting" deployment model where the attackers pick out a lucrative target and spend time and energy penetrating the system to maximize their return, Crowdstrike reported. This is in addition to its regular RaaS business that has exploded during the last year, said Sophos.

Brendon Feeley, Bex Hartley and Sergei Frankoff of Crowdstrike’s Research & Threat Intel team detailed how Pinchy Spider has taken some extraordinary steps to improve the gang’s technical prowess in order to take on more difficult targets. Some of these moves, like recruiting for experts with Remote Desktop Protocol, corporate spamming and virtual network computing skills on dark web forums which could be tells for their new ventures which require these skills. This is in addition to continuously improving the malware with version 5.2 having been recently released.

These skills are needed for big game hunting where instead of just encrypting an endpoint or system they gain entry and persistence and then begin moving laterally. This was first observed in February when an intruder using stolen credentials and RDP made three entries into a victim — being rebuffed once, then returning to conduct additional recon work, and finally looping back a third time to remove the security software that had been blocking GandCrab.

A second incident took place a few weeks later.

"This incident began with a compromise that resulted in the threat actor gaining control of the enterprise domain controller. Once Domain Controller access was acquired, the threat actor used the enterprise’s own IT systems management software, LANDesk, to deploy a loader (Phorpiex) to hosts across the enterprise," Crowdstrike said.

Phorpiex gained access for the gang to all removable drives on the system and then installed GandCrab.

While big game hunting is not new, Pinchy Spider has put its own spin on the tactic. Instead of demanding a single payment to release all the encrypted files in an enterprise, now individual hosts are being encrypted and a payment is being demanded to unlock each host.

On the more "conventional" side of GandCrab, Sophos Labs noted the large number of third parties using the ransomware through its RaaS model, and how it continues to grow its client list through advertising campaigns.

This article was originally published on SC Media US.

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Upcoming event 

Webcast: Understanding this year's biggest adversaries - and how to combat them 

Nation-state activity, versatile, slippery strategies and Big Game Hunting - the threats are real, dangerous and ever changing. 
Brought to you in partnership with Crowdstrike