Hide Your RDP: Password Spray Leads to RansomHub Deployment

July 1, 2025, 8:16 a.m.

Description

This report details a cyberattack where threat actors gained initial access through a password spray attack on an exposed RDP server. They used Mimikatz and Nirsoft for credential harvesting, and employed living-off-the-land techniques along with tools like Advanced IP Scanner for network discovery. The attackers utilized Rclone for data exfiltration via SFTP and deployed RansomHub ransomware across the network using SMB and remote services. The intrusion lasted six days, culminating in widespread encryption and ransom demands. Key phases included initial access, lateral movement, credential theft, data exfiltration, and ransomware deployment, demonstrating a sophisticated and multi-staged attack methodology.

Date

  • Created: June 30, 2025, 6:49 p.m.
  • Published: June 30, 2025, 6:49 p.m.
  • Modified: July 1, 2025, 8:16 a.m.

Indicators

  • ffd09a5c27938d1f7424ed66d1474cfeb3df72daabdf10e09f161ed1ffd21271
  • ec45ebd938e363e36cacb42e968a960fbe4e21ced511f0ea2c0790b743ff3c67
  • 4775dfb24f85f5d776f538018a98cc6a9853a1840f5c00b7d0c54695f03a11d9
  • 25117dcb2d852df15fe44c5757147e7038f289e6156b0f6ab86d02c0e97328cb
  • e14ba0fb92e16bb7db3b1efac4b13aee178542c6994543e7535d8efaa589870c
  • 164.138.90.2
  • 5.181.86.158
  • 185.190.24.54
  • 185.190.24.33