SentinelOne Vs. H0lyGh0st Ransomware – Prevention and Detection
Watch how SentinelOne prevents and detects H0lyGh0st Ransomware. The North Korean threat actor group H0lyGh0st has been active since June 2021 and targets small-to-midsize businesses including banks, factories, schools, and more.
When deploying ransomware, H0lyGh0st attackers exfiltrate all data and later start encrypting devices. H0lyGh0st payloads can be traced back to SiennaPurple and SiennaBlue variations observed back in 2021 (written in Go). Initial delivery can vary, though some attackers have located vulnerable, public-facing servers, on which to exploit CVE-2022-26352.
Upon infection, the attackers first attempt to exfiltrate all desired data, before deploying and launching the ransomware payloads. In addition to having ransom notes dropped on their device(s), H0lyGh0st victims have also reported receiving emails and calls from attackers, alerting them to what their next steps should be.