Overview of Phobos and 8Base Ransomware - The Shakedown

Overview of Phobos and 8Base Ransomware - The Shakedown

Phobos ransomware, first identified in 2019, emerged as an evolution of the Dharma/CrySiS ransomware family[2][14]. Operating under a Ransomware-as-a-Service (RaaS) model, it allowed affiliates to license its malware for attacks targeting small-to-medium businesses (SMBs), government agencies, healthcare, and critical infrastructure[2][12]. Phobos typically infiltrated networks via compromised Remote Desktop Protocol (RDP) connections, phishing emails, or brute-force attacks[2][7]. Its encryption process combines AES-256 and RSA-1024 algorithms, rendering files inaccessible without a decryption key[7][23].

Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown | Europol
A coordinated international law enforcement action has led to the arrest of four individuals leading the 8Base ransomware group. These individuals, all Russian nationals, are suspected of deploying a variant of Phobos ransomware to extort high-value payments from victims across Europe and beyond.

8Base, active since 2022, gained notoriety in 2023 for its aggressive double-extortion tactics: encrypting data and threatening to leak stolen files[6][9]. While initially linked to RansomHouse due to ransom note similarities[15][38], 8Base primarily used a customized variant of Phobos ransomware (version 2.9.1), appending the .8base extension to encrypted files[15][38]. The group targeted SMBs in the U.S., Brazil, and the U.K., focusing on industries like finance, manufacturing, and healthcare[6][13].

August 2024 Ransomware Update
Introduction Ransomware attacks continue to be a significant threat to organizations worldwide. During the week of August 21-27, 2024, ransomware activity showed alarming trends, with 97 victims across various industries and countries. The latest data highlights not only the most targeted sectors but also the geographic distribution and the key

#StopRansomware: Phobos Ransomware | CISA

Key Tactics and Techniques

  1. Initial Access:
    • Phobos: Exploited exposed RDP services and phishing campaigns[2][12].
    • 8Base: Leveraged phishing emails, initial access brokers, and tools like SmokeLoader for payload delivery[6][38].
  2. Evasion and Persistence:
    • Both groups disabled security tools (e.g., Windows Defender), deleted backups, and modified registry entries to maintain access[6][12].
    • 8Base used SystemBC, a proxy/RAT tool, to mask command-and-control traffic[15][39].
  3. Encryption and Extortion:
    • Phobos encrypted local and network drives, using hardcoded keys for offline encryption[2][23].
    • 8Base employed AES-256 in CBC mode for rapid encryption and modified firewall rules to evade detection[11][13].
  4. Monetization:
    • Phobos affiliates demanded ransoms averaging $18,755[7].
    • 8Base escalated demands through public shaming on their leak site, "Space Bears," and negotiated payments via email or Telegram[9][36].

The 2025 Takedown Operation

On February 10, 2025, a coordinated international law enforcement operation led to:

  1. Arrests: Four Russian nationals linked to 8Base were arrested in Phuket, Thailand, following Interpol warrants issued by Swiss and U.S. authorities[35][36]. They allegedly stole $16 million from 1,000+ victims globally[35].
  2. Infrastructure Seizure: The 8Base leak site was seized by German authorities, replaced with a takedown notice from Europol, the FBI, and 14 other agencies[18][35].
  3. Disruption: Over 400 companies were warned of impending attacks, and Phobos/8Base operations saw a sharp decline post-operation[35][36].
2024 Ransomware Activity: A Year in Review
Below is a comprehensive, in-depth review of ransomware data leak site (DLS) activity in 2024, incorporating the latest findings from Analyst1’s “2024 Ransomware Extortion Activity: A Year in Review” as well as additional publicly available threat intelligence. We will explore the surge in ransomware-related “claims,” highlight how attackers leverage

Timeline of Phobos Ransomware Events

  • 2019 (Early): Phobos ransomware is first identified as a variant of the CrySis/Dharma ransomware family. It begins operations, evolving into a prolific ransomware strain. It operates under a Ransomware-as-a-Service (RaaS) model, allowing other cybercriminals to distribute the malware.
  • May 2019: Phobos ransomware incidents impacting state, local, tribal, and territorial (SLTT) governments are regularly reported to the MS-ISAC. These incidents target municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities.
  • 2019 Onward: Phobos variants such as Backmydata, Devos, Eight, Elking, and Faust emerge, targeting various sectors worldwide, including government, healthcare, education, and critical infrastructure.
  • 2019 - Present: Phobos uses a hardcoded RSA public key across variants, making decryption without the attacker's private key nearly impossible.
  • June 2021: Medusa ransomware group becomes active.
  • September - November 2023: FBI and CISA investigations uncover IOCs (Indicators of Compromise) related to Phobos ransomware attacks.
  • October 2023: Phobos actors' file hashes are observed
  • November 2023: Qualys Threat Research identifies Phobos ransomware impersonating VX-Underground.
  • November 2023: Phobos actors' file hashes from open source are identified.
  • February 29, 2024: The FBI, CISA, and MS-ISAC release a joint Cybersecurity Advisory (CSA) AA24-060A to disseminate known TTPs (Tactics, Techniques, and Procedures) and IOCs (Indicators of Compromise) associated with Phobos ransomware.
  • March 27, 2024: Avertium publishes a resource on Phobos ransomware, detailing tactics, techniques, and protective measures.
  • August 21-27, 2024: During this week, ransomware activity shows alarming trends, with 97 victims across various industries and countries.
  • February 7, 2025: The Japanese Cabinet approved a draft legislation introducing "active cyber defense" measures to bolster the nation's cybersecurity framework.
  • February 10, 2025: Breached Company publishes an overview of Phobos and 8Base Ransomware.
  • February 11, 2025: Key figures behind Phobos and 8Base ransomware are arrested in an international cybercrime crackdown.
  • 2020–2025: Analysis of breaches from this time period reveals common methods attackers use to exploit vulnerabilities.

Connections Between Phobos and 8Base

  • Shared Codebase: 8Base utilized Phobos’ encryption mechanisms and RaaS infrastructure, customizing it for double extortion[15][38].
  • Affiliate Overlap: Both groups relied on initial access brokers and shared Jabber/XMPP channels for communication (e.g., "phobos777@exploit.im")[4][9].
  • Parallel Declines: Activity drops in mid-2024 for both groups suggested shared infrastructure or affiliates impacted by earlier law enforcement actions[4][35].

Impact and Significance

  • Financial Losses: Phobos and 8Base collectively extorted millions from SMBs, with 8Base responsible for 15% of global ransomware attacks in May 2023[13][37].
  • Operational Resilience: The takedown highlights the effectiveness of cross-border collaboration, following similar successes against LockBit and AlphV[32][36].
  • Mitigation Lessons: Organizations are urged to secure RDP, enforce multi-factor authentication, and maintain offline backups[12][21].

The following authorities took part in the investigation:

  • Belgium: Federal Police (Federale Politie / Police Fédérale)
  • Czechia: Police of the Czech Republic (Policie České republiky)
  • France: Paris Cybercrime Unit (Brigade de lutte contre la cybercriminalité de Paris - BL2C), Court of Paris - National Jurisdiction Against Organised Crime (Juridiction Nationale de Lutte contre la Criminalité Organisée – JUNALCO)
  • Germany: Bavarian State Criminal Police Office (Bayerisches Landeskriminalamt – LKA Bayern), Bavarian Central Office for the Prosecution of Cybercrime (Generalstaatsanwaltschaft Bamberg – Zentralstelle Cybecrime Bayern)
  • Japan: National Police Agency (警察庁)
  • Poland: Central Cybercrime Bureau (Centralne Biuro Zwalczania Cyberprzestępczości)
  • Romania: Romanian Police (Poliția Română)
  • Singapore: Singapore Police Force CyberCrime Command
  • Spain: Guardia Civil
  • Sweden: Swedish Police Authority (Polisen)
  • Switzerland: Office of the Attorney General of Switzerland (OAG), Federal Police (fedpol)
  • Thailand: Cyber Crime Investigation Bureau (CCIB)
  • United Kingdom: National Crime Agency (NCA)
  • United States: US Department of Justice (US DOJ), Federal Bureau of Investigation (FBI – Baltimore Field Office), US Department of Defense Cyber Crime Center (DC3)

Disrupting ALPHV/Blackcat: A Major Strike Against Global Cybercrime
Introduction The U.S. Justice Department has announced a significant disruption campaign against the Blackcat ransomware group, also known as ALPHV or Noberus. This group has targeted over 1,000 victims worldwide, including critical U.S. infrastructure, marking a major step in the fight against global cybercrime. Justice Department Disrupts

How does Phobos ransomware evade detection by cybersecurity measures

Phobos ransomware employs a multifaceted strategy to bypass cybersecurity defenses, combining technical subterfuge with abuse of legitimate system tools. Here’s a breakdown of its key evasion tactics:

1. Disabling Security Tools

  • Firewall Deactivation:Phobos usestextnetshcommands to disable Windows Firewall, preventing network-based defenses from blocking malicious traffic:bashnetsh advfirewall set currentprofile state off
    netsh firewall set opmode mode=disable
    This allows unrestricted command-and-control (C2) communication and payload delivery713.
  • Antivirus Tampering:The ransomware terminates security-related processes (e.g., Windows Defender) and manipulates Windows Management Instrumentation (WMIC) to delete antivirus services112.

2. Evading Behavioral Analysis

  • Smokeloader Integration:Phobos leverages Smokeloader, a modular malware loader, to decrypt payloads in memory. It manipulates API functions to obfuscate network traffic and evade intrusion detection systems (IDS)313.
  • UAC Bypass:Embedded code can bypass User Account Control (UAC) to execute with elevated privileges, though this is often unnecessary post-compromise due to prior credential theft10.
  • Anti-Analysis Tools:Phobos actors use tools like Universal Virus SnifferProcess Hacker, and PowerTool to terminate analysis utilities and evade sandboxed environments1314.
LockBit Ransomware: An In-Depth Look
LockBit is a prominent cybercriminal group known for its ransomware-as-a-service (RaaS) operation. The group develops ransomware software and leases it to affiliates who carry out attacks. These attacks typically involve encrypting the victim’s data and demanding a ransom for its decryption. LockBit also threatens to publicly leak the stolen data

3. Abuse of Legitimate System Tools (Living-off-the-Land)

  • Backup Destruction:Deletes Volume Shadow Copies usingtextvssadmin.exe delete shadowsand WMIC to erase backups, crippling recovery options213.bashvssadmin.exe delete shadows /all /quiet
  • Legitimate Utilities for Persistence:Usestextschtasksfor scheduled tasks and modifies registry keys (e.g.,textHKCU\Software\Microsoft\Windows\CurrentVersion\Run) to maintain persistence713.

4. Network and Data Obfuscation

  • SystemBC Proxy:Routes traffic through SystemBC, a proxy/RAT tool, to mask C2 communications as benign HTTPS traffic35.
  • Encrypted Configuration:Stores evasion parameters (e.g., excluded directories, target file types) in an AES-encrypted configuration block, hindering static analysis310.

5. Environment Awareness

  • Geographic Avoidance:Checks system locales to avoid infecting devices with Cyrillic language settings, likely to evade scrutiny in Eastern European regions3.
  • Low-Profile Encryption:Limits encryption to non-privileged folders to reduce detection likelihood while maximizing impact on critical user files6.

6. Credential and Privilege Exploitation

  • LSASS Dumping:Uses tools like Mimikatz to extract credentials from memory, enabling lateral movement without triggering authentication alerts13.
  • Active Directory Enumeration:Leverages Bloodhound and Sharphound to map network permissions, targeting high-value assets stealthily1314.

7. Exfiltration Evasion

  • Cloud Storage Abuse:Exfiltrates data via Mega.io and WinSCP, blending malicious transfers with legitimate cloud traffic513.
  • Archiving Sensitive Data:Compresses stolen files intotext.ziportext.rararchives to bypass data loss prevention (DLP) systems13.

By blending these techniques, Phobos operators maintain a low detection profile while maximizing operational impact. Mitigation requires layered defenses, including endpoint detection and response (EDR) for behavioral analysis, strict RDP security, and frequent offline backups11314.

BlackCat/ALPHV: A New Age Ransomware Threat
BlackCat, also known as ALPHV or Noberus, emerged in November 2021 as a ransomware-as-a-service (RaaS) operation. The group responsible for exploiting BlackCat ransomware is considered a significant threat in the cybercriminal world. This article examines the history, tactics, and impact of the BlackCat/ALPHV ransomware group. BlackCat / ALPHV: A New

What are the key differences between Phobos and Dharma ransomware

Phobos and Dharma ransomware share a common lineage but have evolved distinct characteristics in their operations, technical mechanisms, and impact. Below is a breakdown of their key differences:

Origins and Evolution

  • Dharma:First observed in 2016 as an offshoot of CrySiS ransomware, Dharma relies heavily on manual deployment via compromised Remote Desktop Protocol (RDP) services621. Its source code was leaked in 2020, enabling widespread variant creation24.
  • Phobos:Emerged in 2019 as a refined variant of Dharma, adopting a Ransomware-as-a-Service (RaaS) model. Phobos incorporates code from Dharma and CrySiS but introduces modular configurations and affiliate-driven attacks47.
Medusa Ransomware: A Rising Threat in the Cybersecurity Landscape
In recent years, the cybersecurity world has witnessed the rise of a formidable threat: the Medusa ransomware group. Active since June 2021, Medusa has evolved from relative obscurity to a high-profile cybercriminal operation, targeting global corporate entities with demands for exorbitant ransoms. Operational Tactics and Targets Medusa’s modus operandi involves

Encryption Methods

FeatureDharmaPhobos
Symmetric AlgorithmAES-256-CBC (unique key per file)58AES-256-CBC (custom implementation)17
Asymmetric LayerRSA-1024 (variable public keys per variant)RSA-1024 (static public key across variants)74
Key ManagementDecrypts keys from encrypted .data sectionEmbeds hardcoded public key; AES keys encrypted with RSA and stored in files110
File ExtensionsVariant-specific (e.g.,
text
.nqix
,
text
.dharma
)
Configurable (e.g.,
text
.eking
,
text
.acute
)116

Phobos’ use of a hardcoded RSA public key (consistent across variants since 2019) makes decryption without the attacker’s private key nearly impossible7. Dharma’s encryption keys vary by campaign, enabling occasional decryption via leaked keys58.

Infection and Persistence

  • Initial Access:
    • Dharma: Primarily brute-forced RDP (port 3389)621.
    • Phobos: Combines RDP, phishing, exploit kits, and Smokeloader payloads for delivery49.
  • Evasion:
    • Dharma: Terminates processes (e.g., SQL, Outlook) and deletes shadow copies viatextvssadmin524.
    • Phobos: Disables firewalls (textnetsh), deletes backups, and uses SystemBC to mask C2 traffic910.
  • Persistence:
    • Dharma: Copies itself to startup folders and registry keys58.
    • Phobos: Leverages multithreaded scanning, scheduled tasks, and UAC bypass techniques79.

Operational Tactics

  • Targeting:
    • Dharma: Focuses on SMBs, often via opportunistic RDP breaches2124.
    • Phobos: Aggressively targets critical infrastructure (healthcare, government) with double extortion (e.g., 8Base variant leaks data)47.
  • Monetization:
    • Dharma: Demands ~1 Bitcoin per machine, with limited negotiation820.
    • Phobos: Higher average ransom (~$18,755) and iterative extortion (e.g., escalating demands)104.
  • Affiliate Structure:
    • Dharma: Leaked code allows independent actor use.
    • Phobos: RaaS model with centralized infrastructure for affiliates47.

Technical Complexity

  • Configuration:
    • Dharma: Static, with decrypted strings for processes and extensions25.
    • Phobos: Uses an AES-encrypted configuration block (69+ parameters) for dynamic exclusion lists, ransom notes, and version control17.
  • Performance:
    • Phobos employs multithreaded encryption and excludes system files (e.g.,textboot.ini), speeding up attacks110. Dharma lacks comparable optimization25.

Mitigation Challenges

  • Dharma: Restorable via backups if detected early; decryption tools exist for some variants2022.
  • Phobos: Resilient due to static RSA key and hybrid encryption; recovery often requires paying ransoms410.

Summary

While Dharma laid the groundwork for RDP-based attacks, Phobos represents a more sophisticated evolution with RaaS scalability, advanced evasion, and systemic targeting of critical sectors. Phobos’ static encryption key and affiliate network make it a larger-scale threat, whereas Dharma persists through its simplicity and adaptability via leaked code.

Snatch Ransomware Attacks: A Critical Warning for Infrastructure Organizations
In the ever-evolving landscape of cyber threats, ransomware has emerged as one of the most formidable challenges for organizations worldwide. Among the myriad of ransomware strains, one name has been causing particular concern for critical infrastructure organizations: Snatch. As these attacks become more sophisticated and targeted, it’s imperative for infrastructure

Conclusion

The dismantling of Phobos and 8Base underscores the evolving threat of RaaS models and the critical role of international cooperation in cybercrime investigations. While these arrests disrupt current operations, the adaptability of ransomware ecosystems necessitates continued vigilance. For organizations, proactive defense measures remain the best safeguard against emerging threats[2][12][21].

Citations:
[1] https://www.europol.europa.eu/media-press/newsroom/news/key-figures-behind-phobos-and-8base-ransomware-arrested-in-international-cybercrime-crackdown
[2] https://www.avertium.com/resources/threat-reports/phobos-ransomware
[3] https://blog.qualys.com/vulnerabilities-threat-research/2023/11/23/unveiling-the-deceptive-dance-phobos-ransomware-masquerading-as-vx-underground
[4] https://www.trellix.com/blogs/research/phobos-stealthy-ransomware-that-operated-under-the-radar-until-now/
[5] https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-8base
[6] https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/8base-ransomware-group/
[7] https://www.lepide.com/blog/what-is-phobos-ransomware/
[8] https://www.s-rminform.com/latest-thinking/cyber-threat-advisory-phobos-ransomware-launches-new-leak-site-and-pivots-towards-extortion
[9] https://sosransomware.com/en/ransomware-groups/the-irresistible-rise-of-8base-ransomware-understanding-the-threat-and-defenses/
[10] https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/
[11] https://www.sentinelone.com/anthology/8base/
[12] https://www.picussecurity.com/resource/blog/phobos-ransomware-analysis-simulation-and-mitigation-cisa-alert-aa24-060a
[13] https://www.provendata.com/blog/8base-ransomware/
[14] https://www.hhs.gov/sites/default/files/overview-phobos-ransomware.pdf
[15] https://blogs.vmware.com/security/2023/06/8base-ransomware-a-heavy-hitting-player.html
[16] https://www.logpoint.com/wp-content/uploads/2023/08/logpoint-etpr-8base.pdf
[17] https://www.fortinet.com/blog/threat-research/phobos-ransomware-variant-launches-attack-faust
[18] https://www.europol.europa.eu/media-press/newsroom/news/key-figures-behind-phobos-and-8base-ransomware-arrested-in-international-cybercrime-crackdown
[19] https://malpedia.caad.fkie.fraunhofer.de/details/win.phobos
[20] https://hivepro.com/threat-advisory/in-depth-analysis-of-phobos-ransomware/
[21] https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a
[22] https://heimdalsecurity.com/blog/phobos-ransomware/
[23] https://www.threatdown.com/blog/a-deep-dive-into-phobos-ransomware/
[24] https://www.fortinet.com/blog/threat-research/deep-analysis-the-eking-variant-of-phobos-ransomware
[25] https://www.hipaajournal.com/law-enforcement-operation-takes-down-8base-ransomware-group/
[26] https://malpedia.caad.fkie.fraunhofer.de/details/win.8base
[27] https://www.hhs.gov/sites/default/files/8base-ransomware-analyst-note.pdf
[28] https://socradar.io/international-operation-target-8base-phobos-ransomware/
[29] https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/
[30] https://www.linkedin.com/posts/jspasswaters_a-deep-dive-into-phobos-ransomware-recently-activity-7231763350286647297-BMSb
[31] https://www.picussecurity.com/resource/blog/phobos-ransomware-analysis-simulation-and-mitigation-cisa-alert-aa24-060a
[32] https://therecord.media/8base-ransomware-site-taken-down-4-arrested
[33] https://www.sentinelone.com/anthology/8base/
[34] https://cyberint.com/blog/research/all-about-that-8base-ransomware-group-the-details/
[35] https://www.helpnetsecurity.com/2025/02/11/8base-ransomware-group-leaders-arrested-leak-site-seized-phobos/
[36] https://www.infosecurity-magazine.com/news/8base-ransomware-phobos-arrested/
[37] https://www.provendata.com/blog/8base-ransomware/
[38] https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-8base
[39] https://www.logpoint.com/wp-content/uploads/2023/08/logpoint-etpr-8base.pdf

Read more