Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Loading...

Threats

ThreeAM ransomware: an evolving new threat

ThreeAM ransomware emerges as a new cybercrime threat, used as a fallback after failed attacks. Discover details and methods of action.

An evolving new threat

Table of contents

  • The origin of ThreeAM ransomware 
  • Functionality and characteristics of ThreeAM ransomware 
  • The modus operandi of the hacker group ThreeAM 
  • Communication and extortion methods 

In recent years, the ransomware attack landscape has evolved with the emergence of new hacker groups and increasingly sophisticated malware. Among them, ThreeAM ransomware has appeared as a new malicious strain first identified in 2023.

This ransomware group is notable for its peculiarity: it is often used as a backup plan when other ransomware, such as LockBit, fails in its initial attack.

In this article, we will analyze the origins of ThreeAM, its main characteristics, its distribution method, and the risks it poses to businesses and users.

The origin of ThreeAM ransomware 

The ThreeAM ransomware was first identified in February 2023 but was officially mentioned in a Symantec report published in September of the same year.

The analysis revealed that a threat actor, after unsuccessfully attempting to deploy LockBit ransomware, resorted to ThreeAM. This behavior suggests that 3AM ransomware was developed as an alternative in case primary attacks failed. 

Functionality and characteristics of ThreeAM ransomware 

The ThreeAM ransomware stands out due to several unique characteristics. Since it has not yet been fully analyzed due to the lack of available samples, it is known that it uses a 32-bit alphanumeric key to identify the victim. Additionally, it operates as human-operated ransomware (HumOR), requiring hackers to manually set attack parameters. 

Once a system is infected, ThreeAM encrypts files and changes their extensions by adding .threeamtime. A ransom note named RECOVER-FILES.txt is then created, containing instructions on how victims can contact the hackers to recover their files.

Currently, there is no decryptor available, leaving victims with no option but to pay the ransom. 

Ransomware groups

The modus operandi of the hacker group ThreeAM 

The hacker ThreeAM employs sophisticated methods to distribute its ransomware. Although it is not yet clear how the malware is initially distributed, it is likely that the group exploits phishing techniques, vulnerabilities in servers, and RDP brute-force attacks. 

One of the key features of ThreeAM ransomware is the deletion of volume shadow, which are Windows automatic backups, making file recovery nearly impossible without paying the ransom.

This approach is common among ransomware groups and is a typical double extortion tactic, where hackers threaten to publish stolen data if the ransom is not paid. 

Communication and extortion methods 

The ThreeAM ransomware employs various methods to communicate with victims and manage ransom payments. Contact is made via the email ThreeAM@onionmail.org and a Tor website. This allows hackers to remain anonymous and makes tracking transactions difficult. 

Extortion is carried out through direct extortion and double extortion. In the first case, the victim is forced to pay to recover their files. In the second case, in addition to file encryption, hackers threaten to publish sensitive data stolen during the attack. 


Questions and answers 

  1. What is ThreeAM ransomware?
    It is a new ransomware used as a fallback when other attacks fail. 
  1. When was ThreeAM discovered?
    It was first identified in February 2023. 
  1. How does ThreeAM ransomware spread?
    Probably through phishing, exploits of vulnerable servers, and brute-force RDP attacks. 
  1. What happens to files encrypted by ThreeAM?
    Their extensions are changed to .threeamtime, making them inaccessible. 
  1. Is there a decryptor for ThreeAM?
    No, there is currently no decryptor available. 
  1. How do ThreeAM hackers communicate with victims?
    Through email and a Tor ransom site. 
  1. Does ThreeAM delete Windows backups?
    Yes, it deletes the shadow volume to prevent file recovery. 
  1. What is special about ThreeAM?
    It is used as a fallback when other ransomware, such as LockBit, fails. 
  2. What is the name of the ThreeAM ransom note?
    The file containing the instructions is called RECOVER-FILES.txt.  
To top