Gold Melody      , also known as Prophet Spider and UNC961   , is an initial access broker (IAB) that has successfully evaded capture for seven years. Despite being closely monitored by researchers , Gold Melody specializes in compromising organizations through vulnerabilities in publicly exposed servers . They sell access to these compromised organizations to third-party cybercriminals for financial gain . This article provides a detailed description of Gold Melody’s activities and offers recommendations for mitigating the threat they pose.
Gold Melody targets organizations by exploiting vulnerabilities in publicly exposed servers, including JBoss Messaging , Citrix ADC , Oracle WebLogic  , GitLab  , and Apache Log4j . They have been active since at least 2017 and primarily target industries such as retail, healthcare  , energy  , financial    , and high-tech organizations in North America , Northern Europe  , and Western Asia  . Their motives are solely financial and not linked to state actions.
To gain control, Gold Melody utilizes their own tools , such as Gotroj and Barnwork , for remote access  . They possess a wide range of tools , including operating system software , remote access trojans (RATs) , and tunneling tools . Gold Melody establishes persistence using Jakarta Server Pages (JSP) Web shells and conducts reconnaissance on the victim environment . They also employ tools like Mimikatz to harvest credentials and have access to other open source and underground tools.
Once in control, Gold Melody collaborates with ransomware actors , leading to the deployment of ransomware programs like Egregor, MountLocker  , and CryptoDefense  . Secureworks has identified five separate intrusions by Gold Melody between July 2020 and July 2022 .
Mitigation measures are crucial to counter the threat posed by Gold Melody. Early detection and vulnerability management are key . The group exploits recently disclosed vulnerabilities using publicly available exploit code , making it essential for organizations to patch their systems and practice effective vulnerability management. Gold Melody conducts extensive scanning to understand a victim’s environment and engages in credential harvesting , lateral movement , and data exfiltration . By taking proactive measures , organizations can protect themselves and prevent subsequent ransomware attacks facilitated by groups like Gold Melody. It is crucial for companies to have broad visibility across their endpoints , network connections , and cloud solutions to detect and mitigate Gold Melody’s activities early .
Gold Melody’s activities have significant impacts on targeted organizations, including financial losses and reputational damage. To mitigate these risks, organizations must prioritize early detection and vulnerability management. By promptly patching systems and practicing effective vulnerability management , organizations can reduce the likelihood of falling victim to Gold Melody’s attacks. Additionally, maintaining broad visibility across endpoints , network connections , and cloud solutions is crucial for detecting and mitigating Gold Melody’s activities early. By implementing these measures, organizations can protect themselves and prevent future ransomware attacks facilitated by groups like Gold Melody.