RA Group
RA Group, also known as RA World, first surfaced in April 2023, utilizing a custom variant of the Babuk ransomware.

The Origin of RA Group
RA Group emerged in the early 2020s, gaining notoriety for targeting large corporations and government entities.
The group's modus operandi involves exploiting vulnerabilities in network security to deploy ransomware, which encrypts the victim's data and demands a ransom, typically in cryptocurrency, for decryption keys.
RA Group's operations are characterized by a dual-extortion tactic; they not only encrypt the victim's files but also threaten to release sensitive stolen data publicly if their ransom demands are not met. This tactic significantly increases the pressure on victims to comply with their demands.
Over time, RA Group, now RA World, has refined its techniques, making it one of the more feared ransomware groups in the cybersecurity community.

Countries targeted by RA Group
Many of RA Group’s targets were in the US, with a smaller number of attacks occurring in countries such as Germany, India, and Taiwan.
Source: Trend Micro
Industries Targeted by RA Group
The group mainly targets businesses in the healthcare and financial sectors.
Source: Trend Micro
RA Group's Victims
To date, more than 86 victims have fallen prey to RA Group’s malicious operations.
Source: ransomware.live
RA Group's Attack Method

RA Group gains entry into the victim's network through the exploitation of vulnerabilities in unpatched software, exposed remote desktop protocols (RDPs), or via phishing emails.

RA Group escalates privileges within the network to gain higher levels of access.


RA World obtains and leverages credentials to access various parts of the network.

In the process of moving across the network, RA World identifies critical systems that are essential for the organization’s operations.

Once access is gained, RA World uses compromised credentials and internal network tools to navigate laterally across the network.


The custom Babuk ransomware is deployed on the network, targeting essential files.

Sensitive information such as financial records, personally identifiable information (PII), and intellectual property is exfiltrated from the network.

The ransomware encrypts crucial files, making them inaccessible to legitimate users.

RA Group gains entry into the victim's network through the exploitation of vulnerabilities in unpatched software, exposed remote desktop protocols (RDPs), or via phishing emails.

RA Group escalates privileges within the network to gain higher levels of access.


RA World obtains and leverages credentials to access various parts of the network.

In the process of moving across the network, RA World identifies critical systems that are essential for the organization’s operations.

Once access is gained, RA World uses compromised credentials and internal network tools to navigate laterally across the network.


The custom Babuk ransomware is deployed on the network, targeting essential files.

Sensitive information such as financial records, personally identifiable information (PII), and intellectual property is exfiltrated from the network.

The ransomware encrypts crucial files, making them inaccessible to legitimate users.
TTPs used by RA Group
How to Detect RA Group with Vectra AI
FAQs
What is RA Group/RA World?
RA Group, also known as RA World, is a cybercriminal organization known for executing sophisticated ransomware attacks. They typically target large corporations and government entities.
How does RA Group gain access to networks?
RA Group exploits vulnerabilities such as unpatched software, exposed remote desktop protocols (RDPs), and phishing scams to gain initial access to their targets' networks.
What kind of ransomware does RA Group use?
RA Group is known for using custom-developed ransomware, including variants like Babuk, which encrypts files on infected systems and demands a ransom for decryption keys.
What is the typical ransom demanded by RA Group?
The ransom amount can vary greatly depending on the target and the perceived value of the encrypted data, often ranging from tens to hundreds of thousands of dollars, payable in cryptocurrency.
How does RA Group escalate their attack once inside a network?
After gaining initial access, RA Group typically uses compromised credentials and internal tools to escalate privileges and move laterally across the network to identify and compromise critical systems.
What are the dual-extortion tactics used by RA Group?
RA Group not only encrypts the victim's data but also steals sensitive information. They threaten to release this stolen data publicly if their ransom demands are not met.
How can organizations protect themselves against RA Group attacks?
Organizations should regularly update and patch systems, conduct phishing awareness training, secure RDP access, and use multifactor authentication. Implementing an AI-driven threat detection platform like Vectra AI can also help detect and respond to suspicious activities early.
What should an organization do if it falls victim to an RA Group attack?
Affected organizations should isolate infected systems, initiate their incident response and disaster recovery plans, and report the incident to law enforcement. Engaging with cybersecurity experts for forensic analysis and potential data recovery is also advisable.
Can data encrypted by RA Group be recovered without paying the ransom?
Data recovery without paying the ransom depends on the specific ransomware variant used and the availability of decryption tools. Backups are often the most reliable way to restore encrypted data.
What trends are we seeing with RA Group's activities?
RA Group has been increasingly targeting organizations with high-value data and critical infrastructure, often timing their attacks for maximum disruption. Their methods continue to evolve, incorporating more sophisticated techniques to evade detection and increase their success rate.