Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Ransomware gangs are using LockBit’s fame to intimidate victims of recent attacks
Global Security

Ransomware gangs are using LockBit’s fame to intimidate victims of recent attacks

AdminBy AdminOctober 23, 2024No Comments4 Mins Read
Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Ransomware

Criminals have been seen abusing the Amazon S3 (Simple Storage Service) transfer acceleration feature in ransomware attacks designed to steal victims’ data and upload it to S3 buckets under their control.

“Attempts were made to disguise the Golang ransomware as the infamous LockBit ransomware,” Trend Micro researchers Yaromir Khareisi and Nitesh Surana said. “However, this is not the case, and it appears that the attacker is only using LockBit’s popularity to further tighten the noose on their victims.”

Ransomware artifacts have been found to embed hard-coded Amazon Web Services (AWS) credentials to facilitate cloud data extraction, suggesting that adversaries are increasingly using popular cloud providers for malicious schemes.

The AWS account used by the company is believed to be their own or compromised. After responsible disclosure to the AWS security team, the identified access keys and AWS accounts were suspended.

Trend Micro reported that it discovered more than 30 samples with embedded AWS access key IDs and secret access keys, indicating active development. The ransomware is capable of targeting both Windows and macOS systems.

It is not known exactly how the cross-platform ransomware is delivered to the target host, but once launched, it obtains a Universally Unique Machine Identifier (UUID) and performs a series of steps to generate the master key needed to encrypt files.

Cyber ​​security

After the initialization step, the attacker enumerates the root directories and encrypts the files that match the given list of extensions, but not before transferring them to AWS via S3 transfer acceleration (S3TA) for faster data transfer.

“After encryption, the file is renamed in the following format: ..abcd,” the researchers said. “For example, the file text.txt was renamed to text.txt.e5c331611dd7462f42a5e9776d2281d3.abcd.”

In its final stage, the ransomware changes the device’s wallpaper to display an image that mentions LockBit 2.0, presumably in an attempt to force the victim to pay.

“Threat actors can also disguise their ransomware sample as another, more well-known variant, and it’s not hard to see why: the notoriety of high-profile ransomware attacks makes victims more likely to do the attackers’ bidding,” the researchers said.

The development came when Gen Digital released a decoder for a Mallox a ransomware variant that was spotted in the wild between January 2023 and February 2024 exploiting a flaw in a cryptographic scheme.

Ransomware

“Ransomware victims can recover their files for free if they have been attacked by this particular Mallox variant,” researcher Ladzisław Zezula said. “The cryptographic flaw was patched around March 2024, so it is no longer possible to decrypt data encrypted by later versions of the Mallox ransomware.”

It should be noted that a branch of Operation Mallox, also known as TargetCompany, was discovered using a slightly modified version of the Kryptina ransomware, codenamed Mallox v1.0, to compromise Linux systems.

“The Kryptina-derived Mallox variants are branch-specific and separate from other Linux Mallox variants that have appeared since, indicating how the ransomware landscape has evolved into a complex menagerie of cross-pollinated toolkits and non-linear codebases,” SentinelOne Researcher Jim Walter noted at the end of last month.

Ransomware continues be a serious threat: 1,255 attacks were reported in the third quarter of 2024, up from 1,325 in the previous quarter, according to Symantec’s analysis of data obtained from ransomware leak sites.

Microsoft in its digital security report for the annual period from June 2023 to June 2024. said saw a 2.75-fold year-over-year increase in human-driven ransomware encounters, while the percentage of attacks that reached the actual encryption phase has tripled over the past two years.

Some of the main beneficiaries of the decline of LockBit after an international law enforcement operation Its infrastructure has been targeted in February 2024 by RansomHub, Qilin (aka Agenda) and Akira, the latter of which has returned to dual extortion tactics after a brief flirtation with only data theft and extortion attacks in early 2024.

“During this period, we began to see ransomware-as-a-service (RaaS) operators Akira develop a Rust version of their ESXi encoder, iteratively building on payload features while moving away from C++ and experimenting with different programming techniques,” Talos said. said.

Cyber ​​security

There were also attacks involving Akira loan funds compromised VPN credentials and newly discovered security vulnerabilities to penetrate networks and to elevate privileges and move sideways in compromised environments as part of efforts to establish a deeper foothold.

Some of the vulnerabilities used by Akira affiliates are listed below –

“During 2024, Akira targeted a significant number of victims, clearly favoring organizations in the manufacturing and professional, scientific and technical services sectors,” said Talos researchers James Nutland and Michael Seliga.

“Akira may be moving away from using a Rust-based variant of Akira v2 and reverting to previous TTPs using Windows and Linux encoders written in C++.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.