Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

UNC2165 Targets Hybrid Environments with Ransomware

Type
Campaign
Actors
UNC2165
Pub. date
January 21, 2025
Initial access
Unknown
Impact
RansomOpData exfiltration
Observed techniques
Disable anti-virusCloud to on-prem lateral movement
Observed tools
RANSOMHUBFAKEUPDATESVIPERTUNNEL
Targeted technologies
Azure Storage
References
https://services.google.com/fh/files/misc/threat_horizons_report_h1_2025.pdf
Status
Finalized
Last edited
Jan 23, 2025 11:41 AM

In 2024, UNC2165 exploited a victim's environment by a UNC1543 FAKEUPDATES infection to gain initial access. They deployed their Python tunneler, VIPERTUNNEL, for persistent access and used utility scripts for reconnaissance and disabling anti-virus protection. UNC2165 then accessed the victim's Azure blob storage, exfiltrated sensitive data to attacker-controlled cloud servers, and transitioned to a disruptive phase.

The attackers used Group Policy Objects (GPOs) to deploy malicious scheduled tasks that executed the RANSOMHUB ransomware on Windows systems in the victim’s on-premises environment. Additionally, they utilized an Azure run command to execute a bash script on Linux systems in Azure, downloading and executing the Linux variant of RANSOMHUB. The operation involved both data theft and ransomware deployment across hybrid environments.

Made with 💙 by Wiz

Last Updated: April 3, 2025