The RA Group ransomware gang has attacked Decimal Points Analytics. Decimal Points Analytics is a data analytics, AI consulting, and market research firm headquartered in Mumbai, India. The RA Group ransomware gang posted Decimal Points Analytics to its data leak site on July 29th, claiming to have stolen 566GB of financial data, customer agreement documents, audits, salary information, and more. Researchers first identified the RA Group on April 22nd, 2023, when it launched its data leak site. RA Group uses an encryptor based on Babuk's (another ransomware gang) leaked source code. The group primarily targets US manufacturing, pharmaceutical, insurance, and wealth management firms. RA Group uses double extortion tactics. The distinctive trait of the RA Group involves crafting a unique ransom note tailored for the specific organization under attack, and the malware's executable file is also named after the victim. The ransomware targets all logical drives on the victim's computer and network shares, seeking to encrypt specific folders. Notably, directories linked to the Windows system, boot files, Program Files, and similar components are excluded from encryption. This strategy is employed to prevent rendering the victim's system completely unusable, thereby reducing the likelihood of receiving a ransom payment. The encryptor used by the RA Group employs intermittent encryption. This method alternates between encrypting and not encrypting segments of a file, which accelerates the encryption process. However, this approach carries risks as it permits partial data recovery from files. The encryptor utilizes curve25519 and eSTREAM cipher hc-128 algorithms. The files that undergo encryption have the ".GAGUP" extension added to their filenames. Furthermore, any volume shadow copies and contents in the Recycle Bin are purged to hinder data restoration.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.