Holyghost

Description

HolyGhost is a ransomware group first publicly reported in July 2022, believed to be operated by a North Korean state-sponsored threat actor tracked as APT43 or Andariel, a subgroup of the Lazarus Group. The group has been active since at least June 2021, using a double-extortion model that combines encryption of victim files with threats to leak stolen data via a Tor site. Early HolyGhost variants (BTLC_C.exe) used a custom file extension .h0lyenc, while later builds added more robust encryption, obfuscation, and evasion capabilities. Targeted victims include small and medium-sized businesses in manufacturing, finance, education, and event planning, primarily in the United States, South Korea, Brazil, and India. Intrusion methods include exploitation of vulnerable public-facing applications, credential theft, and possibly the use of purchased access from other threat actors. Unlike purely criminal groups, HolyGhost is suspected of being leveraged for both revenue generation and strategic cyber operations in support of DPRK objectives.

External Analysis
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-187a
https://www.bleepingcomputer.com/news/security/us-govt-links-north-korean-holyghost-ransomware-to-lazarus-group/
https://www.microsoft.com/en-us/security/blog/2022/07/14/holyghost-north-korean-threat-actor-uses-custom-ransomware-in-attacks/
Urls
Screen
http://matmq3z3hiovia3voe2tix2x54sghc3tszj74xgdy4tqtypoycszqzqd.onion
File servers
Screen
Chat servers
Screen
Admin servers
Screen