This New Ransomware Is Targeting Windows And Linux PCs With A 'unique' Attack
A newly uncovered form of ransomware is going after Windows and Linux systems in what appears to be a targeted campaign.
Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique which helps stay hidden on compromised networks.
The main targets of Tycoon are organisations in the education and software industries.
Tycoon has been uncovered and detailed by researchers at BlackBerry working with security analysts at KPMG. It's an unusual form of ransomware because it's written in Java, deployed as a trojanised Java Runtime Environment and is compiled in a Java image file (Jimage) to hide the malicious intentions.
"These are both unique methods. Java is very seldom used to write endpoint malware because it requires the Java Runtime Environment to be able to run the code. Image files are rarely used for malware attacks," Eric Milam, VP for research and intelligence at BlackBerry told ZDNet.
"Attackers are shifting towards uncommon programming languages and obscure data formats. Here, the attackers did not need to obscure their code were nonetheless successful in accomplishing their goals," he added.
However, the first stage of Tycoon ransomware attacks is less uncommon, with the initial intrusion coming via insecure internet-facing RDP servers. This is a common attack vector for malware campaigns and it often exploits servers with weak or previously compromised passwords.
SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)
Once inside the network, the attackers maintain persistence by using Image File Execution Options (IFEO) injection settings which more often provide developers with the ability to debug software. The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack.
"Ransomware can be implemented in high-level languages such as Java with no obfuscation and executed in unexpected ways," said Milam.
After execution, the ransomware encrypts the network with files encrypted by Tycoon given extensions including .redrum, .grinch and .thanos – and the attackers demand a ransom in exchange for the decryption key. The attackers ask for payment in bitcoin and claim the price depends on how quickly the victim gets in touch via email.
The fact the campaign is still ongoing suggests that those behind it are finding success extorting payments from victims.
Researchers suggest that Tycoon could potentially be linked to another form of ransomware, Dharma – also known as Crysis – due to similarities in the email addresses, names of encrypted files and the text of the ransom note.
And while Tycoon does have some unique means of executing an infection, like other forms of ransomware, it's possible to prevent it from getting that far.
As RDP is a common means of compromise, organisations can ensure that the only ports facing outward to the internet are those which require it as an absolute necessity.
Organisations should also make sure that accounts which do need access to these ports aren't using default credentials or weak passwords which can easily be guessed as a means of breaking in.
Applying security patches when they're released can also prevent many ransomware attacks, as it stops criminals exploiting known vulnerabilities. Organisations should also ensure they regularly backup their network – and that the backup is reliable – so that if the worst happens, the network can be restored without giving into the demands of cyber criminals.
READ MORE ON CYBERSECURITY
- Ransomware gangs are changing targets again. That could make them even more of a threat
- How ransomware attackers are doubling their extortion tactics TechRepublic
- Ransomware is now the biggest online menace you need to worry about - here's why
- Ransomware froze more cities in 2019 as hackers got smarter CNET
- 30 years of ransomware: How one bizarre attack laid the foundations for the malware taking over the world
Reassessing AI Investments: What The Correction In US Megacap Tech Stocks Signals
The recent correction in US megacap tech stocks, including giants like Nvidia, Tesla, Meta, and Alphabet, has sent rippl... Read more
AI Hype Meets Reality: Assessing The Impact Of Stock Declines On Future Tech Investments
Recent declines in the stock prices of major tech companies such as Nvidia, Tesla, Meta, and Alphabet have highlighted a... Read more
Technology Sector Fuels U.S. Economic Growth In Q2
The technology sector played a pivotal role in accelerating America's economic growth in the second quarter of 2024.The ... Read more
Tech Start-Ups Advised To Guard Against Foreign Investment Risks
The US National Counterintelligence and Security Center (NCSC) has advised American tech start-ups to be wary of foreign... Read more
Global IT Outage Threatens To Cost Insurers Billions
Largest disruption since 2017’s NotPetya malware attack highlights vulnerabilities.A recent global IT outage has cause... Read more
Global IT Outage Disrupts Airlines, Financial Services, And Media Groups
On Friday morning, a major IT outage caused widespread disruption across various sectors, including airlines, financial ... Read more