Aliases 

  • Dark Angels
  • Dark Angels Team
  • White Rabbit

Related Historical Identifiers 

  • MARIO (ESXi) – Babuk-derived ESXi encryptor assessed as part of the Dark Angels lineage 
  • Dunghill – data leak and extortion site branding used in Dark Angels campaign

Get Threat Intel and Security Updates Delivered to Your Inbox.

 

Profiling 

Threat Actor Type: 

  • Financially motivated ransomware and data extortion group specializing in high-value, low-volume intrusions. Dark Angels prioritizes large enterprises, focusing on data theft first and selective encryption (often at the hypervisor / ESXi layer) to maximize leverage while minimizing operational noise. 

Communications & Infrastructure: 

  • Uses Tor-based leak sites and Telegram channels (notably @leaksdirectory) to pressure victims and publish stolen data. 
  • Does not operate as a traditional RaaS affiliate model; campaigns are tightly controlled and highly targeted. 
  • Ransom negotiations are conducted privately, often resulting in non-publicized payments. 

Expertise: 

  • Windows and Linux/VMware ESXi ransomware payloads 
  • Largescale data exfiltration (TBs) prior to encryption 
  • Privilege escalation to domain and hypervisor admin 
  • Long dwell intrusions with extensive reconnaissance 
  • Custom tooling derived from Babuk (Windows) and RagnarLockerlike codebases (Linux/ESXi)  

 

Motivations 

Primary:  

  • High value extortion through double extortion (data theft + selective encryption), often demanding tens of millions of dollars. 

Public reporting confirms Dark Angels received a $75M ransom payment in 2024, the largest publicly known ransomware payment to date, from an unnamed Fortune level organization.  

Figure 1: Dark Angels ransom note.

 

Timeline & Victimology 

2021–Early 2022 – Formation 

  • Group claims inception in 2021; first confirmed activity observed in April 2022. 
  • Early tooling strongly linked to leaked Babuk ransomware source code.  

2022–2023 – Targeted Enterprise Intrusions 

  • Shift toward “big game hunting”: fewer victims, higher ransom demands. 
  • Focus on manufacturing, healthcare, technology, and industrial sectors across North America, Europe, and Asia.  

September 2023 – ESXi-Focused Attack (Johnson Controls) 

  • Dark Angels compromises VMware ESXi hosts, encrypts virtual machines, and exfiltrates ~27 TB of corporate data. 
  • Reported ransom demand exceeded $50M 

2024 – Record Breaking Ransom 

  • Security researchers and crypto intelligence firms confirm a $75M ransom payment to Dark Angels, marking the largest known ransomware extortion payment publicly disclosed.  

2024–2025 – Mature ESXi & Linux Operations 

  • Discovery of bespoke Linux/ESXi encryptors, distinct from Babuk, optimized for:  
  • Datastore enumeration 
  • VM encryption 
  • Snapshot disruption 
  • Continued preference for stealth, persistence, and data theft over mass encryption. 

 

Tactics & Techniques  

Initial Access 

  • Phishing / Spearphishing — T1566 
  • Exploit Public Facing Application — T1190 
  • Valid Accounts — T1078 
  • Exploitation of Known Vulnerabilities (e.g., CVE202322069) — T1190  

Execution 

  • Command and Scripting Interpreter — T1059 
  • Service Execution — T1569.002 

Persistence & Privilege Escalation 

  • Account Manipulation — T1098 
  • Abuse Elevation Control Mechanism — T1548 

Defense Evasion 

  • Impair Defenses — T1562.001 
  • Clear Event Logs — T1070.001 

Credential Access 

  • Credential Dumping — T1003 
  • Account Discovery — T1087 

Lateral Movement 

  • Remote Services — T1021 
  • SMB / Admin Shares — T1021.002 

Collection & Exfiltration 

  • Automated Collection — T1119 
  • Archive Collected Data — T1560 
  • Exfiltration Over Web Services — T1567.002 

Impact 

  • Data Encrypted for Impact — T1486 

 

Defensive Recommendations Against Dark Angels 

  • Treat VMware ESX and the hypervisor as a primary attack surface, not just infrastructure. 
  • Restrict and monitor ESX administrative access, including ADintegrated permissions. 
  • Monitor for snapshot deletion, datastore encryption, and unusual VM operations. 
  • Detect longdwell lateral movement and reconnaissance, not just ransomware deployment. 
  • Maintain offline, immutable backups of VM images and critical data. 
  • Prioritize preencryption detection (data exfiltration, privilege escalation, ESXi command execution). 

 

References 

Zscaler ThreatLabz. Shining Light on the Dark Angels Ransomware Group. https://www.zscaler.com/blogs/security-research/shining-light-dark-angels-ransomware-group 

Daily Security Review. Dark Angels Ransomware: Sophistication & HighStakes Attacks. https://dailysecurityreview.com/resources/dark-angels-ransomware-sophistication-high-stakes-attacks/ 

Cybersecurity Insiders. Johnson Controls Hit by Dark Angels Ransomware. https://www.cybersecurity-insiders.com/johnson-controls-hit-by-dark-angels-ransomware/ 

ISACA. DarkAngels Strikes Big: RecordBreaking Ransom Secured. https://www.isaca.org/resources/news-and-trends/industry-news/2024/darkangels-strikes-big-record-breaking-ransom-secured