Back to Resources

SentinelOne Vs. H0lyGh0st Ransomware – Prevention and Detection

Watch how SentinelOne prevents and detects H0lyGh0st Ransomware. The North Korean threat actor group H0lyGh0st has been active since June 2021 and targets small-to-midsize businesses including banks, factories, schools, and more.

When deploying ransomware, H0lyGh0st attackers exfiltrate all data and later start encrypting devices. H0lyGh0st payloads can be traced back to SiennaPurple and SiennaBlue variations observed back in 2021 (written in Go). Initial delivery can vary, though some attackers have located vulnerable, public-facing servers, on which to exploit CVE-2022-26352.

Upon infection, the attackers first attempt to exfiltrate all desired data, before deploying and launching the ransomware payloads. In addition to having ransom notes dropped on their device(s), H0lyGh0st victims have also reported receiving emails and calls from attackers, alerting them to what their next steps should be.

Watch Now

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.