Technology

Unmasking the 3AM Ransomware: A New Wave of Cyber Attacks!

2025-05-21

Author: Arjun

3AM Ransomware: The Rising Threat!

In a shocking new development in the cyber world, the notorious 3AM ransomware group is unleashing a barrage of highly targeted attacks. Using cunning tactics like email bombing and spoofed IT support calls, they’re manipulating unsuspecting employees into surrendering their credentials for remote access to sensitive corporate systems.

The Playbook's Origin: From Black Basta to 3AM!

This sinister strategy isn’t entirely new; it’s been previously linked to the infamous Black Basta ransomware gang, and echoes seen in attacks by the FIN7 group. What’s alarming, however, is its rapid adoption across the cybercrime landscape, reflecting its effectiveness.

Attack Statistics: A Surge in Cyber Intrusions!

According to a report from Sophos, at least 55 incidents employing this diabolical technique were recorded from November 2024 to January 2025, all pointing to two distinct threat clusters. These attacks closely followed the infamous Black Basta playbook, utilizing email bombings, vishing via Microsoft Teams, and leveraging Quick Assist abuse.

The Deception: Spoofed Calls and Email Bombs!

One chilling incident targeting a Sophos client in early 2025 highlighted a new twist. Instead of the usual Microsoft Teams phishing, the attackers resorted to real phone phishing. They cleverly spoofed the target's legitimate IT department number, delivering their deceptive call amidst a flurry of 24 unsolicited emails received within just three minutes.

How the Attack Unfolded!

Under the guise of addressing alleged malicious activity, the intruder managed to dupe an employee into opening Microsoft Quick Assist, granting remote access. What followed was even more alarming: the cybercriminal extracted a malicious archive from a spoofed domain, packed with a VBS script, a QEMU emulator, and a compromised Windows 7 image laced with the QDoor backdoor.

Evasion Tactics: How Attackers Slipped Through!

Utilizing the QEMU emulator allowed the hackers to obscure their network activity, facilitating persistent and undetected access. They conducted reconnaissance with WMIC and PowerShell, set up a local admin account for RDP connections, and even installed the commercial RMM tool XEOXRemote to take control.

Data Exfiltration: A Massive Breach!

Despite Sophos’s defenses blocking attempts at lateral movement and deactivating their systems, the attackers still successfully siphoned off an astounding 868 GB of data to Backblaze cloud storage using the GoodSync tool.

Containment: A Narrow Escape!

Fortunately for the affected company, Sophos products successfully thwarted further encrypting attempts by the 3AM ransomware, limiting the fallout to massive data theft and the encryption of the compromised host.

Defensive Strategies: How to Protect Your Company!

With the attack spanning a harrowing nine days—data theft wrapped by the third day and further spread halted—Sophos recommends several key defensive measures. Regular audits of administrative accounts for security vulnerabilities, employing XDR tools to block unauthorized legitimate software like QEMU and GoodSync, and enforcing strict PowerShell execution policies for signed scripts are crucial.

The Bottom Line: Awareness is Key!

To counter these nefarious tactics, boosting employee awareness is vital. By establishing blocklists for known malicious entities and improving organizational vigilance, companies can help shield themselves from the threat of ransomware.