Royal is ransomware that first appeared in early 2022; a version that also targets ESXi servers was later observed in February 2023. Royal employs partial encryption and multiple threads to evade detection and speed encryption. Royal has been used in attacks against multiple industries worldwide--including critical infrastructure. Security researchers have identified similarities in the encryption routines and TTPs used in Royal and Conti attacks and noted a possible connection between their operators.[1][2][3][4][5]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1486 | 数据加密以实现影响 |
Royal uses a multi-threaded encryption process that can partially encrypt targeted files with the OpenSSL library and the AES256 algorithm.[2][3][4] |
|
| Enterprise | T1083 | 文件和目录发现 |
Royal can identify specific files and directories to exclude from the encryption process.[2][3][4] |
|
| Enterprise | T1489 | 服务停止 |
Royal can use |
|
| Enterprise | T1106 | 本机API |
Royal can use multiple APIs for discovery, communication, and execution.[2] |
|
| Enterprise | T1082 | 系统信息发现 |
Royal can use |
|
| Enterprise | T1490 | 系统恢复抑制 |
Royal can delete shadow copy backups with vssadmin.exe using the command |
|
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1135 | 网络共享发现 |
Royal can enumerate the shared resources of a given IP addresses using the API call |
|
| Enterprise | T1046 | 网络服务发现 |
Royal can scan the network interfaces of targeted systems.[2] |
|
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares | |
| Enterprise | T1566 | 钓鱼 |
Royal has been spread through the use of phishing campaigns including "call back phishing" where victims are lured into calling a number provided through email.[2][3][5] |
|
| Enterprise | T1095 | 非应用层协议 |
Royal establishes a TCP socket for C2 communication using the API |
|