Maui Ransomware Attacking Healthcare
And Public Health Sector

Contents

Summary Of The Attack

  • North Korean state-sponsored cyber actors are attacking U.S. Healthcare and Public Health (HPH) Sector organizations since at least May 2021.
  • These incidents disrupted the services provided by the targeted HPH Sector organizations for prolonged periods.
  • Compared to other ransomware attacks Maui ransomware is believed to be designed for manual execution by attackers.
  • The attack can be prevented by maintaining off-site offline backups, keeping operating systems, and applications, keeping firmware up to date, and having a proper cybersecurity response plan.
.

What Happened?

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury released a joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which is claimed to have been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.

In June 2022, the Stairwell research team investigated one of lesser-known ecosystems of Ransomware-as-a-Service, the Maui ransomware.

Maui has been shown to have a lack of several key features which are commonly seen with tooling from RaaS providers, such as an embedded ransom note to provide recovery instructions or automated means of transmitting encryption keys to attackers.

Instead, Stairwell research team believes that Maui is manually operated, in which operators will specify which files to encrypt when executing it and then exfiltrate the resulting runtime artifacts.

Security awareness training also promotes a heightened level of attention to the subtle activities performed by a threat actor, who has the objective of illegally obtaining your data or damaging your corporate resources.

What Is Maui Ransomware?

Since May 2021, the FBI has observed and responded to multiple Maui ransomware incidents at HPH Sector organizations.

North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services, including electronic health records services, diagnostics services, imaging services, and intranet services.

In some cases, these incidents disrupted the services provided by the targeted HPH Sector organizations for prolonged periods.

 

The initial access vector(s) for these incidents is unknown.

The earliest identified copy of Maui…

(SHA256 hash: 5b7ecf7e9d0715f1122baf4ce745c5fcd769dee48150616753fec4d6da16e99e)

…was first collected by Stairwell’s inception platform on 3 April 2022.

Maui is believed to be designed for manual execution by attackers.

When executed at the command line without any arguments, Maui prints usage information, detailing supported command-line parameters.

The only required argument is a folder path, which Maui will parse and encrypt identified files.

Maui command line usage details:

Maui command line usage details

Free Security Policy Templates

Get a step ahead of your cybersecurity goals with our comprehensive templates.

IT Security Policy Templates

How Does Maui Ransomware Work?

Instead of relying upon external infrastructure to receive encryption keys, Maui creates three files in the same directory it was executed from (unless a custom log directory is passed using the -p command line argument) containing the results of its execution.

These files are likely exfiltrated by Maui operators and processed by private tooling to generate associated decryption tooling.

Indicators of Compromise (IOCs) obtained from FBI incident response activities since May 2021 are provided below:

Maui ransomware Indicators of Compromise

How Maui Encrypts Data

Maui uses a combination of Advanced Encryption Standard (AES), RSA, and XOR encryption to encrypt [T1486] target files:

  • Maui encrypts target files with AES 128-bit encryption. Each encrypted file has a unique AES key, and each file contains a custom header with the file’s original path, allowing Maui to identify previously encrypted files. The header also contains encrypted copies of the AES key.
  • Maui encrypts each AES key with RSA encryption. Maui loads the RSA public (maui.key) and private (maui.evd) keys in the same directory as itself.
  • Maui encodes the RSA public key (maui.key) using XOR encryption. The XOR key is generated from hard drive information (\\.\PhysicalDrive0).

While Maui is encrypting files, it outputs status information back to operators. Command line output during execution:

Maui command line output during execution

How To Mitigate Maui Ransomware

The advisory also provides mitigation steps organizations can prepare for or deal with attacks using Maui ransomware.

Thankfully, although Maui may be a little different from run-of-the-mill ransomware, the steps to protect against it are not:

  • Maintain off-site, offline backups of data and test them regularly.
  • Create a cyber security response plan.
  • Keep operating systems, applications, and firmware up to date.
  • Disable or harden remote desktop protocol (RDP).
  • Require multi-factor authentication (MFA) for as many services as possible.
  • Require administrator credentials to install the software.
  • Report ransomware incidents to your local FBI field office.

We hope that this article will guide you to this recent attack and give you good advice on how to protect yourself and your organization.

The best advice that can be given is always to keep your systems and services updated as soon as they are available.

Article by

Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.
Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.

Share This Article

Our Editorial Process

Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.

Categories

The Breach Report

Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.

Related Breaches