Original Release Date: 5/25/2023
Money Message Tor Leak Site. Image Source: BleepingComputer
A relatively new and very active ransomware group identified as Money Message was observed targeting a New Jersey private organization. Money Message Ransomware was first observed targeting organizations worldwide and demanding million-dollar ransoms as early as mid-March. The group appears to routinely target large corporations that provide services to several subsidiaries impacting third-party entities and their customers. The group has published substantial quantities of victims’ stolen data on their data leak site including Micro-Star International (MSI) and PharMerica. These breaches impacted millions of individuals and left several devices vulnerable to malicious firmware after signing keys for the Intel Boot Guard security feature were leaked. The Money Message encryptor is written in C++ and includes an embedded JSON configuration file to determine how a device will be encrypted. When launched, it will delete Shadow Volume Copies, terminate processes, and create a ransom note named money_message.log. At the time of this writing, indicators of compromise (IOCs) are limited.
The NJCCIC urges organizations to remain vigilant, keep systems up to date and apply patches as they become available, enable strong endpoint security, and enforce cyber hygiene. Additionally, implement a defense-in-depth strategy, segment networks, apply the Principle of Least Privilege, enable MFA where available, encrypt sensitive data at rest and in transit, create and test continuity of operations plans and incident response plans, and establish a comprehensive data backup plan that includes performing scheduled backups regularly, keeping an updated copy offline in a separate and secure location, and testing regularly. The NJCCIC provides further recommendations in the Ransomware: The Current Threat Landscape post and the Ransomware: Risk Mitigation Strategies technical guide. Incidents may be reported to local police departments, the FBI, and the NJCCIC. Further reporting can be found in the BleepingComputer article.