Remove Antivirus Remove Blog Remove Encryption Remove Information Security
article thumbnail

ViperSoftX uses more sophisticated encryption and anti-analysis techniques

Security Affairs

xyz pic.twitter.com/VLhISark8Y — Goldwave (@OGoldwave) March 13, 2023 The variant employed in the campaign supports a more sophisticated encryption method of byte remapping and a monthly rotation of the C2 server. ViperSoftX also checks for active antivirus products running on the machine. c2 arrowlchat[.]com

article thumbnail

An expert shows how to stop popular ransomware samples via DLL hijacking

Security Affairs

The security researcher John Page aka ( hyp3rlinx ) discovered that malware from multiple ransomware operations, including Conti , REvil , LockBit , AvosLocker , and Black Basta, are affected by flaws that could be exploited block file encryption. “Conti looks for and executes DLLs in its current directory. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New CACTUS ransomware appeared in the threat landscape

Security Affairs

The new ransomware strain outstands for the use of encryption to protect the ransomware binary. CACTUS essentially encrypts itself, making it harder to detect and helping it evade antivirus and network monitoring tools,” Laurie Iacono, Associate Managing Director for Cyber Risk at Kroll, told Bleeping Computer.

article thumbnail

City of Dallas shut down IT services after ransomware attack

Security Affairs

FBI and CISA believe this variant, which uses its own custom-made file encryption program, evolved from earlier iterations that used “Zeon” as a loader.” After gaining access to victims’ networks, Royal actors disable antivirus software and exfiltrate large amounts of data before ultimately deploying the ransomware and encrypting the systems.”

article thumbnail

DEV-0569 group uses Google Ads to distribute Royal Ransomware

Security Affairs

The DEV-0569 group carries out malvertising campaigns to spread links to a signed malware downloader posing as software installers or fake updates embedded in spam messages, fake forum pages, and blog comments. ” reads the report published by Microsoft.

article thumbnail

Ezuri memory loader used in Linux and Windows malware

Security Affairs

“The loader decrypts the malicious malware and executes it using memfd create (as described in this blog in 2018). Upon executing the code, it will ask the user the path for the payload to be encrypted and the password to be used for AES encryption to hide the malware within the loader. ” concludes the report.

Malware 136
article thumbnail

Woody RAT: A new feature-rich malware spotted in the wild

Malwarebytes

This blog post was authored by Ankur Saini and Hossein Jazi. In this blog post, we will analyze Woody Rat’s distribution methods, capabilities as well as communication protocol. The threat actor has left some debugging information including a pdb path from which we derived and picked a name for this new Rat: Debug Information.

Malware 108