Skip to main content

Command Palette

Search for a command to run...

Why is a ransomware from 2020 still taking down hundreds of businesses in 2025?

Makop Ransomware is back, an old vulnerability but new tactics have caused unpredictable consequences for businesses..

Updated
7 min read
Why is a ransomware from 2020 still taking down hundreds of businesses in 2025?

Overview

Makop ransomware is emerging as one of the most dangerous threats targeting businesses operating Windows systems via Remote Desktop Protocol (RDP). Exploiting weakly secured RDP ports or leaking login information, the Makop attack group quietly infiltrates the internal network, escalates privileges, and installs malware that encrypts all of the victim's data in just a few minutes. What's worrying is that Makop doesn't use overly complicated techniques, instead they just take advantage of the administrator's subjectivity in protecting RDP.

Makop is also known for its rapid customization: each campaign creates new malware variants, attaching different extensions, anti-analysis techniques and separate ransom payment instruction records. Thanks to that, this ransomware can bypass many traditional defense layers and make it difficult for businesses to trace the source of the attack.

What is Makop ransomware?

Makop ransomware first appeared in late 2020 and was quickly identified as a family of ransomware operating strongly under the Ransomware-as-a-Service (RaaS) model. Unlike famous malware lines such as REvil or LockBit, Makop operates more silently, mainly relying on a network of small-scale affiliates, attacking small and medium-sized targets instead of large businesses.

In its early stages, Makop used relatively simple encryption techniques, accompanied by file extensions such as .makop, .lokd, or .espino, but variations quickly increased. From 2021 to 2023, the Makop development team continuously releases new versions with the ability to:

  • Customize the extension name according to the campaign.

  • Hybrid encryption combines AES + RSA.

  • Insert ransom note in HTML or TXT format.

  • Added difficult analysis techniques such as obfuscation and packer.

  • Automatically delete shadow copies to prevent data recovery.

From 2023–2024, Makop has strongly shifted to attack campaigns against businesses using Windows Server infrastructure, causing a series of intrusion reports worldwide. The continuous appearance of variants such as ACCESS, LOCKED, CARTOP shows that the Makop operating team is still actively developing and refining the malware.

To date, Makop is considered one of the most persistent ransomware lines in the RDP brute-force attack segment, targeting unprotected or misconfigured environments.

Techniques used by Makop Ransomware

  • RDP (Remote Desktop Protocol) attack.

  • Privilege Escalation.

  • BYOVD – Bring Your Own Vulnerable Driver.

  • Use AV Killer/Security Disabler.

  • Lateral Movement – ​​Move through other machines.

  • Use a loader like GuLoader.

  • Shadow Copy – Prevents data recovery.

  • Strong data encryption (AES + RSA).

Commonly exploited Makop vulnerabilities

  • CVE-2016-0099: LPE Windows Kernel, CVSS 7,8

  • CVE-2017-0213: Windows Update Medic, CVSS 7,8

  • CVE-2018-8639: Win32k Elevation, CVSS 7,8

  • CVE-2019-1388: Service Control Manager, CVSS 7,0

  • CVE-2020-0787: BITS Service, CVSS 7,8

  • CVE-2020-0796: SMBGhost, CVSS 10 (RCE/Privilege Escalation)

  • CVE-2020-1066: Windows Installer, CVSS 7,8

  • CVE-2021-41379: Desktop Window Manager, CVSS 7,8

  • CVE-2022-24521: Win32k Subsystem, CVSS 7,8

  • CVE-2025-7771: ThrottleStop.sys Driver, CVSS 8,4 (BYOVD)

Attack mechanism and exploitation process​

Execution chain (Source - Acronis)

Unlike many common malware, Makop has a methodical and detailed attack flow with the first stage being system reconnaissance. The goal of this stage is to detect hosts with open RDP, collect usernames, and network information. Here the attacker will perform RDP brute-force or log in with a credential leak.

Acronis

Once inside the system, they use network scanning tools such as: Advanced IP Scanner or NetScan to identify high-value servers, internal shares and network resources that need to be taken over.

Acronis

From here we will map goals to carry out the next stages.

Acronis

In the next stage, the attacker will execute the pre-loaded payload or use a loader like GuLoader to download. payload. payload. These payloads can be executed via scheduled tasks, new services, or by remote execution tools (PsExec-like).

The attacker then continues to create a hidden local account, create an auto-start service, and add Run keys to the registry to maintain access. Makop uses a series of LPE vulnerabilities, or they will exploit known Windows vulnerabilities (old CVEs). A special point at this stage is that the attacker will install a driver with a valid signature but with vulnerabilities to execute code in the kernel, turning off AV/EDR.

Acronis

To easily install additional Backdoors, attackers will disable the security system.

Acronis

Acronis

Next, the Makop malware will move to the avoidance and sabotage phase, where the malicious code is placed in a disguised folder (such as desktop, music folder) or named like a legitimate process such as: taskmgr.exe, mc_osn.exe to avoid detection.

Acronis

Finally, once he has full control over the system and removes the security software, Makop will delete Volume Shadow Copies / system restore points to prevent restore. The attacker's aim would be to encrypt data and leave a ransom note.

Main impact of malicious code

  • Risk of paralysis of entire operations because the server system is encrypted.

  • Loss of important data without offline backup.

  • Data leak occurs if the attack group chooses the “double extortion” model.

  • Huge financial losses due to operational disruptions, loss of customers, and compliance fines.

Mapping tóm tắt sang MITRE ATT&CK

  • Initial Access: T1078 (Valid Accounts), T1110 (Brute Force)

  • Execution: T1059 (Command and Scripting Interpreter), T1106

  • Persistence: T1547 / T1543 (Registry Run Keys; Services)

  • Privilege Escalation: T1068 (Exploitation for Privilege Escalation), BYOVD (kernel exploitation patterns)

  • Defense Evasion: T1562 (Impair Defenses), T1222 (File and Directory Permissions Modification)

  • Discovery: T1046 (Network Scanning)

  • Lateral Movement: T1021 (Remote Services), T1077 (Windows Admin Shares)

  • Collection / Exfiltration: T1560, T1041 (optional)

  • Impact: T1486 (Data Encrypted for Impact), T1490 (Inhibit System Recovery)

Conclude

Makop ransomware is not a technically sophisticated line of malware, but its simplicity, durability, and focus on exploiting businesses' most common weaknesses make it a dangerous and difficult threat to eliminate. Most Makop attacks originate from vulnerabilities that organizations can completely prevent, especially opening RDP to the Internet, using weak passwords, lack of monitoring mechanisms, and insecure backups.

In the context of ransomware groups increasingly tending to industrialize their operating models, Makop is a clear demonstration of how even a small error in configuration can lead to serious consequences - from operational disruption, loss of important data, to heavy financial losses. This highlights that effective defense does not necessarily require complex technology, but rather lies in maintaining information security discipline, reinforcing basic configurations and applying sound security processes.

The fight against ransomware is a long-term journey, and success will only come when organizations view information security as a core part of operations, not just a post-incident response. With a multi-layered defense strategy and proper awareness, Makop will only be an "easy to resolve" threat, instead of becoming a disaster for the entire system.

  1. Enhanced RDP security (highest priority)

    • Turn off RDP if not needed.

    • If you must use RDP:

      • Switch default port 3389 → custom port.

      • Enable Network Level Authentication (NLA).

      • Only allow RDP through VPN, do not open directly to the Internet.

      • Limit IP access allowed (Dynamic Firewall Rules).

    • Turn on brute-force protection.

      • Set up Account Lockout Policy.

      • Use a firewall with Geo-blocking (unnecessary country blocking).

  2. Account security – identity management

    • Use strong passwords + MFA.

    • Disable or rename the default Administrator account.

    • Apply the Least Privilege model.

  3. Protect Endpoints & Servers

    • Fully updated operating system and software.

    • Install new generation EDR/Antivirus.

    • Block deletion of shadow copies.

  4. Personnel training – Security Awareness

    • Periodic training on:

      • Identify phishing emails.

      • It's safe to use RDP remotely.

      • Do not download crack files or strange tools.

      • Report the problem immediately.

IOC

  1. Makop ransomware

    • 8ccb30606e3229ff88b3b67a5f4b2b087cab290ce7eedfcb24d1d3954b01d5f9

    • f43b86ff363f19f26cc7d80aa64fa0894a264a736ae0abd013d98e344637e4d8

    • 0e3c6b3366640989979ae059b768586ff1d8ba4c4b96b49b40609cdaa871363c

  2. Hash

    • 10ea5ac09ec72101c6f8656f3f08f6f9495f8b43849f27928efd6485cee04913

    • 6752d24da3565761c94ab10d3010e1be702221783f9b509209f97a8e32003767

    • aac0c5ad612fb9a0ac3b4bbfd71b8931fc762f8e11fdf3ffb33ef22076f9c4bc

    • 0a4a0f0df5eea57f16a76bff6489dd95a7089afba8e9e5c8bcadc46870af33fb

    • a903f4d8f126a830b8f12e05c035b86e4dfd65cb1fd64d0d0b503035b49d0cb7

    • 6cf6dd6119abcb2751c2692fb93a623b5b4bd290cb3dc217fa9fe09dd721fcdd

    • 7470ae5b55ca282695d2f7c4896344622c94292a915aa63e55000beeb2c1350e

    • ca08299002fa6181d249115907ee29356e698d72ff06afdca05431c1ed38db35

    • fb1dd40577af7ac4d8c32506e78e39841ff6d05ee643c18270ef26eac798df3f

    • 0745633619afd654735ea99f32721e3865d8132917f30e292e3f9273977dc021

    • 5b9407df404506219bd672a33440783c5c214eefa7feb9923c6f9fded8183610

    • c7e471218b00cdec4f7845a80f1c5b069ee97bf270f878ea45b2dd53aad14798

    • 0d468fa92767ca1abe881155224d94879b575860e403636d3dbb550e9b9a6a7a

    • 5994db4362ded8bf15f81f134e14b9ed581cd2e073709b5fae6b2363bae455e9

    • f181b8ae88f6c657c3ec3d1d5e8420fbf340c543b3d9292947ae035e3591b664

    • 43c3b5dbc18ebbc55c127d197255446d5f3e074fdac37f3e901b718acbe7c833

    • 20c730c7033b5bdc0a6510825e90449ba8f87942d2d7f61fa1ba5f100e98c141

    • 1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326

    • feb09cc39b1520d228e9e9274500b8c229016d6fc8018a2bf19aa9d3601492c5

    • bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56

    • 5b7b280b53ff3cf95ead4fd4a435cd28294c5fce6a924ec52e500a109deb868b

    • 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0

    • 5caacdc577c27110f639d4d7c0241607c1bc53ee6f5dbd337793d05cc57e703f

    • 41a328c3bb66e94d73e861699a5ebc4a5c0c7fcee2129e5ecd98c7bde1f95e8e

    • bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4

    • eaa9dc1c9dc8620549fee54d81399488292349d2c8767b58b7d0396564fb43e7

    • 37d2a1626dc205d60f0bec8746ab256569267e4ef2f8f84dff4d9d792aa3af30

    • 1845fe8545b6708e64250b8807f26d095f1875cc1f6159b24c2d0589feb74f0c

    • ffa28db79daca3b93a283ce2a6ff24791956a768cb5fc791c075b638416b51f4

    • a332f863da1709b27b62f3a3f2a06dca48c7dabe6b8db76ec7bb81ce3786e527

    • 3cc5ee93a9ba1fc57389705283b760c8bd61f35e9398bbfa3210e2becf6d4b05

    • 61c0810a23580cf492a6ba4f7654566108331e7a4134c968c2d6a05261b2d8a1

    • 8c57b97b04d7eabbae651c3400a5e6b897aea1ae8964507389340c44b99c523a

    • a8bf7da7e2f62296985e1aadbac8373f5ac813ac158047f5b5579a3f900fd85b

    • 3fa65f17518d10af9ed316fbd0395bf39b3b75a63a5374ff071cbba4b642e4a3

    • 6e95adda5f24fdf805ad10ae70069484def3d47419db5503f2c44b130eedf591

    • e97bdf7fafb1cb2a2bf0a4e14f51e18a34f3ff2f6f7b99731e93070d50801bef

    • 76f88afe7a18e3583bfcc4aed3b3a0ca8a9c18c62ee5f4d746f8da735c47a5e3

    • 3902165d0645afdb4b7d95f5cc55d65ecee17d3b77a31d51170e0beae3fd296a

    • b044c6dbd55747c3592ac527215c3dbf71f92aa4bd8eee5e29ddad571b9335b4

    • 4c6cf8dda0c55fafab37569d2e11621c42e17f37a290b13087215190f7518d73

    • 10c0dd2878bd0ab9732cd593febf61d94bb2b798bf0aa1c8fa45ddf8c7092cbc

    • 17fb52476016677db5a93505c4a1c356984bc1f6a4456870f920ac90a7846180

    • 51fd557a7325dd58cfcabebbbc33ef452d93f812c189360d4f2bf87c6df0a59c

    • c7d994eb2042633172bd8866c9f163be531444ce3126d5f340edd25cbdb473d4

    • f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446

    • dd748db20e3909596ab18ce3f0b1264e2cfe9f67dfb4bce7d4f9c085ec1fce0a

    • 92c65b58c4925534c2ce78e54b0e11ecaf45ed8cf0344ebff46cdfc4f2fe0d84

    • 3da3b704547f6f4a1497107e78856d434a408306b92ba7c6e270c7c9790aa576

    • a1a6005cc3eb66063ae33f769fc2d335487b2ed7f92c161e49ad013ffed11ec8

    • 8b9c7d2554fe315199fae656448dc193accbec162d4afff3f204ce2346507a8a

    • be2b45b7df8e7dea6fb6e72d776f41c50686c2c9cfbaf4d456bcc268f10ab083

    • 722fff8f38197d1449df500ae31a95bb34a6ddaba56834b13eaaff2b0f9f1c8b

    • 26d5748ffe6bd95e3fee6ce184d388a1a681006dc23a0f08d53c083c593c193b

    • 4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5

    • f20721945a0a4150470e63bc81c9316cbb5802a60615ae4393283273a62cf8a2

    • de903a297afc249bb7d68fef6c885a4c945d740a487fe3e9144a8499a7094131

    • 37ff328175acd45ef27d3d339c3127a7612ad713fccd9c9aae01656dfbf13056

    • 8f7569e82bd339f3e24431884687b095f678971f20053787d93359672bb9f687

    • 5cdabf41672241798bcca94a7fdb25974ba5ab2289ebadc982149b3014677ae3

    • b5c2474397fb38a4dd9edab78b6e5178832074ba5bab9bac3f0cad7bc0660cf2

    • 5ff803269d6491dd3f0267f6f07b8869e3f08d62cf2110b552bba2cc3d75d26a

    • c8afb68260b9036d8e65811927c379112274a2526cc161c7f1502457a501a0d3

    • 01f34180bb635022681723eef73c19adf330d7a32a2e6639c27b1ee5777312be

    • c8e8cca4ee3c4f4ce4f2076ed93cca058fa1ff88d5ffe49d8d293b27ad25ef68

    • 8315327f22eff069457c02ddda1ea32a31964e1b8ab688709bcb96c6ccbb6212

Reference

  1. Makop Ransomware Exploits RDP Systems with AV Killer and Other Exploits

  2. Makop Ransomware Targets RDP Systems Using AV Killer and Additional Exploits

  3. Makop ransomware: GuLoader and privilege escalation in attacks against Indian businesses

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.