Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Experts Find Common Codebase Linking Morpheus and HellCat Ransomware Payloads
Global Security

Experts Find Common Codebase Linking Morpheus and HellCat Ransomware Payloads

AdminBy AdminJanuary 23, 2025No Comments3 Mins Read
Morpheus and HellCat Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 23, 2025Ravi LakshmananThreat Intelligence / Data Breach

Extortionists Morpheus and HellCat

Analysis of the HellCat and Morpheus ransomware operations revealed that affiliates associated with the respective cybercrime actors use identical code for their ransomware.

The findings come from SentinelOne, which analyzed artifacts uploaded to the VirusTotal malware scanning platform by the same author in late December 2024.

“These two payload samples are identical except for the victim’s specific details and the attacker’s contact details,” security researcher Jim Walter said in a new report shared with The Hacker News.

Cyber ​​security

Both HellCat and Morpheus are new entrants to the ransomware ecosystem, appearing in October and December 2024, respectively.

Further examination of the Morpheus/HellCat payload, a 64-bit portable executable, revealed that both samples require a path as an input argument.

They are both configured to exclude the \Windows\System32 folder as well as a hard-coded list of extensions, namely .dll, .sys, .exe, .drv, .com, and .cat, from the encryption process.

“An unusual characteristic of these Morpheus and HellCat payloads is that they do not change the extension of the target and encrypted files,” Walter said. “The file contents will be encrypted, but the file extensions and other metadata will remain intact after being processed by the ransomware.”

In addition, the Morpheus and HellCat samples rely on the Windows Cryptographic API to generate keys and encrypt files. The encryption key is generated using BCrypt algorithm.

Except for encrypting files and removing identical ransom notes, no other system modifications are made to the affected systems, such as changing desktop wallpapers or adjusting storage mechanisms.

SentinelOne said the ransom notes for HellCat and Morpheus follow the same pattern as Underground teamanother ransomware scheme that emerged in 2023, although the ransomware payload itself is structurally and functionally different.

Extortionists Morpheus and HellCat

“HellCat and Morpheus RaaS operations appear to be recruiting common partners,” Walter said. “While it is impossible to assess the full extent of interaction between the owners and operators of these services, it appears that a common code base, or perhaps a common builder program, is used by partners associated with both groups.”

The development comes at a time when ransomware continues to thrive, albeit in an increasingly fragmented fashion, despite law enforcement’s ongoing efforts to combat the threat.

“The financially motivated ransomware ecosystem is increasingly characterized by decentralized operations, a trend driven by the disruption of larger groups” — Trustwave said. “This shift has paved the way for smaller, more nimble actors to shape a fragmented but resilient landscape.”

Cyber ​​security

Data shared by NCC Group shows that a record 574 ransomware attacks were recorded in December 2024 alone, with FunkSec they account for 103 incidents. Some of the other common ransomware groups are Cl0p (68), Akira (43), and RansomHub (41).

“December is usually a much quieter time for ransomware attacks, but last month saw the highest number of ransomware attacks, turning that pattern on its head,” Ian Usher, deputy director of threat intelligence operations and innovation services at NCC Group, said.

“The emergence of new and aggressive actors like FunkSec, which have been at the forefront of these attacks, is alarming and points to a more turbulent threat in 2025.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.