Wednesday, May 14, 2025
HomeRansomwareNew Variant of Scarab Ransomware Distributed via RDP on Systems and Servers

New Variant of Scarab Ransomware Distributed via RDP on Systems and Servers

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from Malwarebytes detected Scarab ransomware variant distributed through RDP and used AES algorithm for encryption. The Scarabey variant is written in Delphi and it is identical to Scarab version the only change is the addresses of code and memory data references.

The popular version of the Scarab Ransomware distributed by a Necurs botnet and it is written in C. Scarabey found targetting Russian users and is designed same as like any other ransomware demanding Bitcoin.

The main difference between them is the ransom note, with Scarab it is written in English and on Scarabey it is written in Russian. Scarab uses to warn the users to make payment soon else the price will increase, on the other hand, Scarabey warns more and more files will be encrypted.

Researchers said There is no backdoor or remote access code in scarab or its variants, which makes the threat of deleting files on victim’s computer impossible.
- Advertisement - Google News

Execution Flow – Scarabey

It checks with the parameters before executing to ensure this is the first run, also it makes sure there is key process is running. If any key process found it kills the process to avoid having the file locked.

Encryption loops called multiple sections in the code, but the main loop performs the majority of the encryption. It goes through all the folders if the file is not .exe or .dll it encrypts and changes to the .scarab extension.

It doesn’t use crypto  APIs instead it uses AES algorithm for encryption. Malwarebytes provided technical analysis of the ransomware.

“The key used to encrypt changes from file to file. Meaning that two files with identical content will be different after encryption. Essentially what happens is that there is an initial key and many subkeys are derived from that key.
If just a single encryption key was used for all of the files, you would be able to capture the memory at any point in the encryption process, save the key, and use it to decrypt all of the files on your hard drive. Unfortunately, because of this key cycling that Scarab performs, it makes decryption of the files likely impossible.” researchers said.

Once the disk drive encryption completed it calls to the enumeration functions to locate the network drives and folders.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command

Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona,...