Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

This new ransomware group is targeting big businesses – here’s what you need to know

  • May 16, 2023
Total
0
Shares
0
0
0


A new ransomware (opens in new tab) threat actor has been detected targeting big businesses in hopes of equally large payouts.

Cybersecurity researchers from Talos uncovered a threat actor called RA Group which kicked off its operations in April 2023 using the Babuk source code, which was previously leaked, apparently by one of its former members. 

So far, the group has successfully attacked three organizations in the US, and one in South Korea. It doesn’t seem to have an industry preference, as the victims were in manufacturing, wealth management, insurance, and pharmacy.

Personalized ransom notes

There’s nothing particularly unique about RA Group. It launches double extortion attacks, stealing sensitive data as it encrypts the systems, in hopes of motivating the victims to pay the ransom demand. Its website seems to be a work in progress, as the group is still making cosmetic changes. When it leaks the data, it discoses the name of the victim, a list of the stolen data, the total size, and the victim’s website. 

The ransom note is personalized for each individual victim, the researchers added, claiming this, too, is standard practice among ransomware threat actors. What isn’t standard practice, however, is naming the victims in the executables, as well.

The malware encrypts only parts of files, in order to move faster. After the encryption is complete, the files get the .GAGUP extension. The ransomware then deletes everything in the Bin with the API SHEmptyRecyclebinA, as well as volume shadow copy by executing the local Windows binary vssadmin.exe, an administrative tool used to manipulate shadow copies.

The ransomware does not encrypt all files, though. Some are left accessible so that the victims can contact the group easier. The non-encrypted files are necessary for the victims to download the qTox application, used to reach out to the attackers.


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • Technology

WNBA app rolls out TikTok-style video feed to attract younger fans

  • May 16, 2023
View Post
Next Article
  • News

Biden Team to Counter Tech Espionage Unveils Cases Involving China and Russia

  • May 16, 2023
View Post
You May Also Like
View Post
  • News

6 new Netflix Original movies and shows you can’t miss in June

  • May 30, 2023
View Post
  • News

Google confirms it’s been working on a another foldable but it’s not ready “yet”

  • May 30, 2023
View Post
  • News

Corsair introduces iCUE Link to make building your next PC easier

  • May 30, 2023
View Post
  • News

Windows 11 23H2 update is real, we’re told – but it could disappoint

  • May 30, 2023
View Post
  • News

iFi’s iCan Phantom is a beast of a headphone amp for the fussiest of cans

  • May 30, 2023
View Post
  • News

Microsoft gets defensive and reminds users how great Windows 11 is

  • May 30, 2023
View Post
  • News

Microsoft’s latest Windows 11 mishap causes havoc with AMD graphics cards

  • May 30, 2023
View Post
  • News

Possibly the worst Microsoft Teams update is rolling out now

  • May 30, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.