CrazyHunter: The Rising Threat of Open-Source Ransomware
April 8, 2025, 11:53 a.m.
Description
A ransomware attack on Mackay Memorial Hospital in Taiwan highlights the growing use of publicly available offensive tools by threat actors. The CrazyHunter ransomware, built using the Prince Ransomware builder from GitHub, encrypted over 600 devices across two hospital branches. The attack, likely initiated via a USB device, employed various tools for defense evasion, encryption, and lateral movement. The threat actor used a vulnerable Zemana driver to disable security products, utilized the Prince Ransomware builder for file encryption, and leveraged SharpGPOAbuse for lateral movement. The incident demonstrates the increasing accessibility of cyber attack tools, enabling even less skilled actors to launch sophisticated attacks. This trend poses significant challenges for attribution and defense against ransomware threats.
Tags
Date
- Created: April 8, 2025, 10:30 a.m.
- Published: April 8, 2025, 10:30 a.m.
- Modified: April 8, 2025, 11:53 a.m.
Indicators
- f72c03d37db77e8c6959b293ce81d009bf1c85f7d3bdaa4f873d3241833c146b
- d1081c77f37d080b4e8ecf6325d79e6666572d8ac96598fe65f9630dda6ec1ec
- bdfc66266a2a19fc3d5dccef3eefe4c0ee928ba5b7abad60bc320218b2082fea
- 983f5346756d61fec35df3e6e773ff43973eb96aabaa8094dcbfb5ca17821c81
- 754d5c0c494099b72c050e745dde45ee4f6195c1f559a0f3a0fddba353004db6
- 5316060745271723c9934047155dae95a3920cb6343ca08c93531e1c235861ba
- 512f785d3c2a787b30fa760a153723d02090c0812d01bb519b670ecfc9780d93
- 2cc975fdb21f6dd20775aa52c7b3db6866c50761e22338b08ffc7f7748b2acaa
- 14359f54d49799c713c2a8cc0c19a88392a0c6ad2c383494023008326cd0ba15
- 2bbc6b9dd5e6d0327250b32305be20c89b19b56d33a096522ee33f22d8c82ff1
Additional Informations
- Healthcare
- Taiwan