Beast Gang Exposes Ransomware Server | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


An open server hosted on a German cloud provider’s systems has been discovered, containing the entire toolset of a member of the Beast ransomware group. The find exposes the tactics, techniques, and procedures (TTPs) of the threat actor, but also reveals that Beast shares many of those TTPs with other ransomware gangs.

According to threat-intelligence firm Team Cymru, the ransomware toolset includes those used for reconnaissance, network mapping, credential theft, and exfiltration, as well as techniques for persistence and moving laterally through the local environment.

Many of the tools, such as AnyDesk for remote management and Mega for downloads, have both legitimate and malicious uses — and those tools are commonly used by many ransomware groups, says Will Thomas, senior threat intelligence adviser for Team Cymru.

“The way that a lot of ransomware groups operate is, they’re reusing a lot of the tools that other ransomware groups use,” he says. “For many companies, it is not as hard as it seems to actually defend against [these attacks], because as long as you have the right protections in place to block these [tools] from being able to run on your systems, they’re not going to be able to hit you.”

Related:Interlock Ransomware Targets Cisco Enterprise Firewalls

Ransomware continues to be a persistent problem, albeit one with that companies are slowly coming to grips with. In 2025, only half of attacks resulted in encryption, the lowest in six years and down from a high of 70% in 2024, according to Sophos’ “The State of Ransomware 2025” report. Yet, 49% of organizations affected by an attack paid the ransom, the second highest number in six years, the report found.

Common Ransomware Tools, Uncommon Attribution

The Beast ransomware group is a fairly new one, having sprung from another strain — the so-called Monster ransomware gang. It announced itself in 2024, and began operations as a ransomware-as-a-service (RaaS) scheme in February 2025, launching a data-leak site in July.

The group is known for using tools to find and delete backups, and to stop security- and backup-related processes. Beast terminates processes that have to do with “databases, backup and recovery, antivirus products, Office, file editors, and emails,” threat-intelligence researchers from South Korea-based AhnLabs stated in an October analysis of the group.

“Beast ransomware goes beyond simple file encryption and employs a complex attack method that combines structural recovery prevention techniques and data exfiltration,” AhnLab researchers stated. “As such, establishing an early detection and rapid response system is crucial.”

Related:EU Sanctions Companies in China, Iran for Cyberattacks

 

For that reason, companies should not only have backups, but resilient backups. Ransomware gangs will seek out and destroy any backup, especially Windows volume shadow copies or network-attached backups. In the latest server analysis, Team Cymru’s Thomas found a file, “disable_backup.bat,” designed to delete backups made with the Volume Shadow Copy Service (VSS) on Microsoft Windows and to halt the service.

More advanced backup methods — if online — may fare no better, he says.

“Other organizations will use backup and replication software, so that [they] can back up sensitive files — things like Active Directory, copies of Active Directory and other sensitive files, servers and stuff — to a backup system,” Thomas says. “However, the backup system is still connected to the network, so when the ransomware gang gets in and encrypts everything on the network, that gets encrypted as well.”

Off-site logging is also critical because the Beast ransomware server also uses another file, CleanExit.exe, that is likely a tool to wipe logs after the ransomware was triggered, Team Cymru stated in its analysis.

Enterprises Beware Cyber War on Backups

Companies should use endpoint detection and response (EDR) systems to detect malicious activity, or better yet, MDR — the managed version of those systems. They should also use allow-listing to track approved applications.

Related:DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike

“If you have EDR tools on agents running on your systems, the commands and processes that are run to trigger these is very easy to spot,” Thomas says. “Most EDRs will have the ability to just … block [a dual-use tool] by default because it’s such a high-risk process, or is too high-risk of an action to do without authorization.”

Being able to find attackers’ servers — especially when those servers have the ransomware payload files — is a key win, Thomas says. Because the groups are using many of the same tools, threat researchers are hard-pressed to attribute specific attacks to specific groups. For example, the Beast ransomware gang uses the Mega desktop app for exfiltration, but so does Akira, Conti, and a score of other groups.

The ransomware binary allows researchers to know which ransomware gang is behind the attack, Thomas says.

“If you just see that list of tools minus the binaries, then we don’t really know which ransomware gang it is necessarily,” he says. “It’s only because the binaries are there, we can then attribute to which ransomware gang it is.”



——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW