Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Kasseika ransomware uses BYOVD trick to remove security pre-encryption
    Cyber Security

    Kasseika ransomware uses BYOVD trick to remove security pre-encryption

    techempireBy techempire3 Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    Kasika ransomware

    The ransomware group is known as Kasaka has become the latest group to exploit bring-your-own-vulnerability driver (BYOVD) attacks to disable security-related processes on infected Windows hosts, joining other groups such as Akira, AvosLocker, BlackByte and RobbinHood.

    Trend Micro said in an analysis on Tuesday that this tactic allows “threat actors to terminate anti-virus processes and services to deploy ransomware.”

    Kasaka, discovered for the first time The cybersecurity company’s mid-December 2023 show overlaps with the now-defunct BlackMatter, which emerged after DarkSide shut down.

    There is evidence that the ransomware virus may be the work of an experienced threat actor who obtained or purchased access to BlackMatter, as the latter’s source code was never publicly leaked after its demise in November 2021.

    Internet security

    The attack chain involving Kasseika begins with a phishing email used for initial access, followed by a dropped remote administration tool (RAT) to gain privileged access and move laterally within the target network.

    It was observed that threat actors leveraged Microsoft’s Sysinternals PsExec command line utility to execute a malicious batch script, which checks for the presence of a process named “Martini.exe” and, if found, terminates the process to ensure that There is only one instance. The processes that run the machine.

    The main responsibility of this executable file is to download and execute the “Martini.sys” driver from the remote server to disable the 991 security tool. Notably, “Martini.sys” is a legitimately signed driver named “viragt64.sys” that has been added to Microsoft’s vulnerable driver block list.

    “If Martini.sys is not present, the malware will terminate itself and will not continue executing its intended routine,” the researchers said. This indicates that drivers play a crucial role in defense evasion.

    After this step, “Martini.exe” will launch the ransomware payload (“smartscreen_protected.exe”), which uses ChaCha20 and RSA algorithms to handle the encryption process, but not before killing all accessing Windows reboot management Server processes and services.

    A ransom note is then placed into each directory it encrypts, and the computer’s wallpaper is modified to display a note demanding payment of 50 Bitcoins to the wallet address within 72 hours, or else face being charged every 24 hours once the deadline passes. Risk of paying an additional $500,000.

    Most importantly, victims should post a screenshot of a successful payment to an actor-controlled Telegram group to receive the decryptor.

    Internet security

    The Kasseika ransomware also has other tricks, including clearing traces of activity by clearing the system’s event logs using the wevtutil.exe binary.

    “The wevutil.exe command can effectively clear application, security, and system event logs on Windows systems,” the researchers said. “This technique is used with caution and makes it more challenging for security tools to identify and respond to malicious activity. .”

    Palo Alto Networks Unit 42 details the BianLian ransomware gang’s shift from a dual ransomware scheme to encryption-free ransomware attacks after releasing a free decryptor in early 2023.

    Bianlian has been an active and pervasive threat group since September 2022, primarily targeting healthcare, manufacturing, professional and legal services in the United States, United Kingdom, Canada, India, Australia, Brazil, Egypt, France, Germany and Spain industry.

    Stolen Remote Desktop Protocol (RDP) credentials, known security vulnerabilities (such as ProxyShell), and web shells are the most common attack vectors used by carriers to penetrate enterprise networks.

    Additionally, the cybercriminal group shared a custom .NET-based tool with another ransomware group tracked as Makop, suggesting a potential link between the two.

    “This .NET tool is responsible for retrieving file enumeration, registry and clipboard data,” security researcher Daniel Frank said in a new overview from BianLian.

    “This tool contains some Russian words, such as the numbers one through four. The use of a tool like this suggests that the two organizations may have shared a toolset or used the services of the same developer in the past.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.