Comrad Circle Ransomware Advisory
Version 1.0 – 30 June 2024
Technical Breakdown
1. File Extension & Renaming Patterns
• Confirmation of File Extension:
All encrypted files are appended with the extension “.comrade” in lower-case.
• Renaming Convention:
Original filename → <original>.comrade
(no obfuscation)
A ransom note—identical to every encrypted directory—is saved as README-FOR-DECRYPT.txt
.
2. Detection & Outbreak Timeline
• Approximate Start Date/Period:
First analytical sample surfaced mid-April 2024 on Russian-language cyber-crime boards.
Public alerts issued by CISA/CERT-UA on 28 May 2024, identifying a pro-Ukraine hacktivist agenda behind the campaign.
3. Primary Attack Vectors
| Vector | Details |
|——–|———|
| Weaponised RDP Scans (Port 3389) | Brute-forcing weak or re-used admin credentials; once inside, it drops ComradCircle.exe to C:\Users\Public\
. |
| Phishing Attachments (ISO/IMG via e-mail) | Malicious ISO mounts an LNK that runs the payload with rundll32
to bypass macro restrictions. |
| Living-off-the-Land & Lateral Movement | Uses builtin WMIC
, PowerShell
, and PsExec
to infect additional hosts after initial foothold. |
| Vulnerability Exploitation | Although no zero-day has been proven in the wild, the actors leverage CVE-2020-1472 (Zerologon) and CVE-2023-36908 (ManageEngine) when scanning open perimeter networks. |
Remediation & Recovery Strategies
1. Prevention
• Patch immediately: Windows cumulative updates up to June 2024 patch most exploitable binaries.
• Disable SMB & RDP at the edge unless explicitly required; enforce credential tiering / jump boxes.
• Baseline PowerShell ExecutionPolicy to “AllSigned” or block with AMSI + AppLocker.
• Network segmentation: VLAN shine-firewalls for critical domain controllers / ERP systems.
• Phishing controls: E-mail MTAs with attachment sandboxing; user-awareness training on ISO/IMG quarantine.
• Backup hygiene: Follow 3-2-1 rule with immutable, off-site backups (S3 Object Lock or WORM tape).
2. Removal
- Disconnect from network (both Ethernet and Wi-Fi).
- Collect incident artefacts (ransom note, EXE hash, Prefetch and SRUM logs).
- Boot into Safe-Mode w/ Networking or Windows PE recovery USB if boot-loader is intact.
- Run ESET Online Scanner, Kaspersky Virus Removal Tool, and Microsoft Defender Offline. (All vendors detect Comrad Circle under names such as Win32/Ransom.ComradCircle.A.)
- Revoke affected credentials across DC, SaaS, and VPN portals; force user/AD password reset.
- Scan all lateral hosts with Nessus or MSS-Sentinel hunting queries looking for:
-
powershell.exe -enc …
with entropy > 6.6 - Creation of README-FOR-DECRYPT.txt in share roots.
- After confirmation of complete malicious file erasure, restore from the most recent clean offline backup.
3. File Decryption & Recovery
• Recovery Feasibility: IMPOSSIBLE TODAY.
Comrad Circle uses RSA-2048 with AES-256 in GCM mode. The private key resides exclusively on the attacker’s server.
No public decryptor exists (27 Jun 2024).
No reputable ransom solution: Even when paid, actors often “ghost” victims.
• Essential Tools/Patches: Make sure all OS and major applications are updated to:
- KB5034441 (Windows 10/11)
- KB5034442 (Server 2019/2022)
- Exchange CU/Security Update June 2024 (in case mailbox-level encryption is attempted)
4. Other Critical Information
• Unique Characteristics & Distinguishers
Includes an embedded LockBit-style victim portal on Tor (6 pin domains).
Message inside README-FOR-DECRYPT.txt
signatures itself From your Comrade(s)
– subtle reference to bad-Russian grammar, yet the malware tags itself “#SupportUkraine”, aligning with political motives.
Optional wiper component triggered after timer expires (72 h); overwrites MBR with Russian text salutation.
• Broader Impact / Notable Clusters
European Union water utility (CO9874: May 2024) – OT CSRS (water SCADA) outage 48 hs.
UK county council (⊙300 schools) – ransom demand of $850 k in XMR (Monero).
Heightens scrutiny on hacktivism blurring the cybercrime line; U.S. Treasury OFAC warning June 2024 clarifies any ransom payment to Comrad Circle risks sanctions and Kingpin Act penalties.
Executive Cheat-Sheet (TL;DR)
• Extension: .comrade
• Timeline: In-the-wild since April 2024, politically motivated pro-Ukraine group.
• Propagation: RDP brute-force > lateral PsExec > AES-256 encryption of NTFS and ReFS volumes.
• Pay = No decryptor. Use immutable backups and patch Zerologon ASAP.