Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a message from our sponsor. Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs. Yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler 0Trust AI stops attackers by hiding your attack surface, making apps and IPs invisible. Eliminating lateral movement. Connecting users only to specific apps, not the entire network. Continuously verifying every request based on identity and context. Simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions. Hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more@Zscaler.com Security hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Jim Walters (1:58)
We've been following Hellcat for some time as per their association with breach forums and Shiny hunters and that whole extended universe. And so when they branched out into ransomware through the Hellcat brand, it was just kind of a natural progression research wise.
Dave Bittner (2:17)
That's Jim Walters, senior threat researcher on Sentinel Labs research team. The research we're discussing today is titled Hellcat and Morpheus. Two brands, one payload. As ransomware affiliates drop identical code. Well, let's dig into what these actually are here. I mean, for folks who aren't familiar, how do you describe Hellcat and Morpheus in that context?
Jim Walters (2:46)
I describe these as ransomware as a service operations, affiliate based ransomware operation. So in other words, if you want to get into ransomware and spreading it and profiting from it, one option that you have available to you is become part of an affiliate program. So you would join something like a lock bit or a ransom hub or a Hellcat or a Morpheus. These are services that take a cut of the profits but also simplify the creation of payloads. So in turn for lowering the barrier of entry, in other words, making it simpler to generate ransomware and track campaigns and deal with the modification side of it, they all do that for you. The Service does that for you. You just have a nice little portal where you manage everything, and then in turn, they get a share of whatever profits you might get from that ransomware activity. And Hellcat and Ransomware fall into this category, just as we see with things like I mentioned Lockbit, Ransom Hub and dozens and dozens of others.
![The ransomware clones of HellCat & Morpheus. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F2eed5260-00ee-11f0-a428-ab3a2222630e%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)