Royal is ransomware that first appeared in early 2022; a version that also targets ESXi servers was later observed in February 2023. Royal employs partial encryption and multiple threads to evade detection and speed encryption. Royal has been used in attacks against multiple industries worldwide--including critical infrastructure. Security researchers have identified similarities in the encryption routines and TTPs used in Royal and Conti attacks and noted a possible connection between their operators.[1][2][3][4][5]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1486 | Data Encrypted for Impact |
Royal uses a multi-threaded encryption process that can partially encrypt targeted files with the OpenSSL library and the AES256 algorithm.[2][3][4] |
|
Enterprise | T1083 | File and Directory Discovery |
Royal can identify specific files and directories to exclude from the encryption process.[2][3][4] |
|
Enterprise | T1490 | Inhibit System Recovery |
Royal can delete shadow copy backups with vssadmin.exe using the command |
|
Enterprise | T1106 | Native API |
Royal can use multiple APIs for discovery, communication, and execution.[2] |
|
Enterprise | T1046 | Network Service Discovery |
Royal can scan the network interfaces of targeted systems.[2] |
|
Enterprise | T1135 | Network Share Discovery |
Royal can enumerate the shared resources of a given IP addresses using the API call |
|
Enterprise | T1095 | Non-Application Layer Protocol |
Royal establishes a TCP socket for C2 communication using the API |
|
Enterprise | T1566 | Phishing |
Royal has been spread through the use of phishing campaigns including "call back phishing" where victims are lured into calling a number provided through email.[2][3][5] |
|
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares | |
Enterprise | T1489 | Service Stop |
Royal can use |
|
Enterprise | T1082 | System Information Discovery |
Royal can use |
|
Enterprise | T1016 | System Network Configuration Discovery |