HelloKitty Ransomware

The ransomware attack against CD Projekt Red was conducted by a ransomware group that goes by the name 'HelloKitty,' and yes, that's the name the threat actors utilize.

Today, CD Project disclosed that they were the target of a ransomware attack that encrypted devices on their network and led to the theft of unencrypted files.

"Yesterday we discovered that we have become a victim of a targeted cyber attack, due to which some of our internal systems have been compromised.

"An unidentified actor gained unauthorized access to our internal network, collected certain data belong to CD PROJEKT capital group, and left a ransom note the content of which we release to the public. Although some devices in our network have been encrypted, our backups remain intact. We have already secured our IT infrastructure and begun restoring the data," CD Projekt disclosed today.

As part of the announcement, CD Projekt also released a screenshot of the ransom note that was left behind by the attackers.

Ransom note from CD Projekt Red ransomware attack
Ransom note from CD Projekt Red ransomware attack

According to Emisoft's Fabian Wosar, the ransomware responsible for this cyberattack is called 'HelloKitty.'

tweet

This ransomware operation has been active since November 2020 and has targeted other large companies, such as the Brazilian power company CEMIG last year.

If you have first-hand information about this or other unreported cyberattacks, you can confidentially contact us on Signal at +16469613731 or on Wire at @lawrenceabrams-bc.

What we know about the HelloKitty group

As the HelloKitty malware is not particularly active, there is not much information about the ransomware. However, BleepingComputer was able to gain access to a sample after a victim posted it in our forums in November 2020.

The HelloKitty ransomware is named after a mutex named 'HelloKittyMutex' used when the malware executable is launched.

HelloKittyMutex mutex shown in Process Explorer
HelloKittyMutex mutex shown in Process Explorer

Once launched, HelloKitty will repeatedly run taskkill.exe to terminate processes associated with security software, email servers, database servers, backup software, and accounting software, such as QuickBooks.

An example of the taskkill.exe command is below:

"C:\Windows\System32\taskkill.exe" /f /im postg*

The ransomware will also attempt to shut down related Windows services with the net stop command, like the following:

"C:\Windows\System32\net.exe" stop MSSQLServerADHelper100

In total, HelloKitty targets over 1,400 processes and Windows services.

After it has shut down the various targeted processes and services, it will begin to encrypt files on the computer. When encrypting files, it will append the .crypted extension to an encrypted file's name, as shown below.

HelloKitty encrypted files
HelloKitty encrypted files

If the ransomware encounters a locked file when encrypting, it will use the Windows Restart Manager API to automatically terminate processes or Windows services that are keeping the file open.

As each HelloKitty executable is customized with a custom ransom note, the ransom note name may change depending on the victim. For the HelloKitty victims that BleepingComputer has seen, the ransom name is typically named 'read_me_unlock.txt,' which was also the same name used in the CD Projekt cyberattack.

These ransom notes are customized on a per-victim basis to include the amount of data that was stolen, what data was targeted, and in many cases, the name of the company. This custom text indicates that the attackers lurk in the compromised network for some time as they steal data, and when finished, deploy the ransomware. 

Enclosed in the ransom note is a Tor dark web URL that victims can visit to  negotiate with the ransomware actors.  This Tor URL is different for each victim and contains a simple chat interface to talk to the threat actors.

Tor chat site
Tor chat site

It is unknown how great the ransom demands are for this ransomware gang and whether victims have paid in the past.

At this time, no known weakness could allow a victim to decrypt their files for free.

Related Articles:

HelloKitty ransomware rebrands, releases CD Projekt and Cisco data

The Week in Ransomware - April 19th 2024 - Attacks Ramp Up

REvil hacker behind Kaseya ransomware attack gets 13 years in prison

French hospital CHC-SV refuses to pay LockBit extortion demand

Philadelphia Inquirer: Data of over 25,000 people stolen in 2023 breach