Monday, March 31, 2025
Homecyber securityAlbabat Ransomware Expands Reach to Target Linux and macOS Platforms

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

Published on

SIEM as a Service

Follow Us on Google News

A recent report from Trend Micro has revealed that a new variant of the Albabat ransomware now targets Linux and macOS platforms, marking a significant expansion in its capabilities.

Previously limited to Windows systems, this updated strain demonstrates the evolving sophistication of ransomware threats.

The malware is still under active development, with its multi-OS functionality posing heightened risks to organizations with diverse IT environments.

New Multi-OS Capabilities Detected in Latest Variant

The ransomware operates by encrypting files on infected endpoints, sparing only those stored in specific system-related directories.

Additionally, it exhibits advanced anti-analysis mechanisms by terminating various system processes, including those related to debugging, virtual machines (VMs), and other security tools.

A notable feature of the new variant is its use of the GitHub REST API to retrieve configuration data, showcasing the attackers’ reliance on legitimate cloud services to evade detection.

Detection and Mitigation Measures

Symantec has identified and implemented protections against this threat through multiple detection technologies.

These include adaptive-based signatures such as ACM.Ps-Http!g2 and ACM.Untrst-Bcdedit!g1, behavior-based detections like SONAR.SuspLaunch!gen4, and machine learning algorithms such as Heur.AdvML.A!300.

VMware Carbon Black products also provide robust defenses by blocking malicious indicators and delaying malware execution for cloud-based scans.

The ransomware has been classified under various threat categories, including Ransom.Albabat and Trojan.Gen.MBT.

Network-based detections are also in place to identify suspicious activities such as connections to GitHub cloud services or malicious applications attempting to access cloud storage.

Organizations are advised to enforce strict endpoint security policies, including blocking all forms of unknown or potentially unwanted programs (PUPs) and leveraging advanced reputation services for real-time threat intelligence.

The addition of Linux and macOS support underscores the growing trend of ransomware developers targeting non-Windows platforms to exploit gaps in multi-OS security strategies.

By leveraging cloud-based services like GitHub for operational purposes, attackers further complicate detection efforts while maintaining operational efficiency.

Organizations are urged to adopt a proactive approach by implementing comprehensive endpoint protection solutions, conducting regular security audits, and ensuring all systems are updated with the latest patches.

As ransomware threats like Albabat continue to evolve, maintaining a layered defense strategy remains critical in mitigating potential damages.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...