Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Redcurl goes out of espionage to redemption from the first in the history of the qwcrypt deployment
Global Security

Redcurl goes out of espionage to redemption from the first in the history of the qwcrypt deployment

AdminBy AdminMarch 26, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 26, 2025Hacker NewsLicking Program / Safety Finally

Russian loud hacking group called Redcurl He was associated with the ransom company for the first time, which notes the departure on the “threat of the actor”.

Activity observe The Romanian Bitdefender Cybersecurity Company provides for the deployment of never seen a ransom, called QWCRIPT.

RedcurlThey are also called the Earth Capr and the Red Wolf, has the history of the orchestration of corporate attacks aimed at different structures of Canada, Germany, Norway, Russia, Slovenia, Ukraine, the United Kingdom and the United States. It is known that it has been actively operating since November 2018.

Cybersecurity

Chains of attacks documented According to Group-IB in 2020, the use of possessive sheets containing personnel resources (HR) to activate the process of deployment of malware. Earlier this January hunting minute The attacks set by the actor threatened to several organizations in Canada to deploy a loader called Redloader with “simple back” capabilities.

Then last month Canadian Cybersecurity Company Esentire disclosed Using Redcurl Spam PDF attachment is masked as resume and accompanying letters in phishing messages to download malicious forklift software using the legitimate Adobe “AdnotificationManager.exe”.

The sequence of the attack, the detailed Bitdefender, traces the same stages, using files with a mounted images (ISO), masked into resume to start a multi -stage infection procedure. In the image of a disk that mimics the Windows Savior Savior (SCR) is the binary AdnotificationManager.exe used to perform the loader (“Netutils.dll”) by downloading dll.

“After the shooting of netutils.dll, she immediately launches a Sherlexecutea call with an open verb by sending the victim’s browser at https://secure.indeed.com/auth,” said Martin Tsugiak, director of technical decisions at Bitdefender, in a report that shared with Hacker News.

“This reflects the legitimate” Really “page, calculated by a distraction intended for misleading the victim, thinking they just open a resume. This social engineering tactic gives a window to work malicious software.”

Image Source: Esentire

Forklift, for the Bitdefender, also acts as a download for the next DLL stage, as well as setting stability on the host through the planned task. Then the recently received dll is performed by means of the program compatibility (pcalua.exe), technique minute According to Micro trend in March 2024.

Access provided by the implant opens the way for lateral motion, allowing the actor threatening to move on the network, collect exploration and even more escalate their access. But it seems that the main turn from the established Operandi regime, one of these attacks also led to the deployment of redemption.

Cybersecurity

“This purposeful targeting can be interpreted as an attempt to maximize the damage with minimal effort,” Tsugiak said. “Having encrypted virtual machines located on hypervisers, making them unsolvable, Redcurl effectively disables the entire virtual infrastructure, affecting all the services located.”

The software is executed, in addition to using your own vulnerable driver technique (BYOVD) to disable the final points software, takes measures to collect system information before running the encryption procedure. What’s more, the ransom note decreased after encryption appears to be inspired by LockBit, Hardbit and Mimic.

“This practice of reshuffling the existing redemption text raises questions on the origins and motivations of the Redcurl group,” Zuggek said. “In particular, there is no well -known special leak site (DLS) associated with this compelling way, and it remains unclear whether the note is about buying a true extortion or sabotage.”

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.