Monday, April 28, 2025
HomeRansomwareMassive Sigma Ransomware Attack From Russia-Based IPs and Lock the Victims Computers

Massive Sigma Ransomware Attack From Russia-Based IPs and Lock the Victims Computers

Published on

SIEM as a Service

Follow Us on Google News

Newly discovered Sigma Ransomware spreading from Russia-based IP’s with the variety of social engineering techniques to compromise victims and lock the infected computer.

Users Targeting via malicious SPAM Emails that contain a statement which comes from “United States District Court” with a malicious attachment.

Nowadays attackers using the Email scam to target the victim to perform various malicious activities and playing with the user by some emergency strings of fear and increase the victim’s curiosity.

- Advertisement - Google News

Sigma Ransomware Attack conducted from around 32 Russian based IP’s and the attacker registered the specific domain which is specified using to perform various attacks.

Malware authors used more obfustication functions by requesting the password to open the file evade the detection.

Sigma Ransomware Working Function

Initially, the Malicious files required a password to open because it tricks the user to download the attachment that should be protected since the mail come from the court, a clever trick used by an attacker.

If it Finds the Macros are turned off on the victim’s machine then it convenience the users to turn it on which contains malicious VBScript.

Later on, VBScript will download the original Sigma Ransomware payload from attack command and control server and save it into  %TEMP% folder.

Downloaded malware mimics as a legitimate  svchost.exe process which helps to download one more malware.

The Malware used various of obfuscation technique to hide it and evade the detection and it kills itself if it finds ay virtual machine or sandboxes.

According to Comodo Research, Unlike some of its close ransomware relatives, Sigma does not act immediately but lurks and makes covert reconnaissance first. It creates a list of valuable files, counts them and sends this value to its C&C server along with other information about the victim’s machine.

Also if the sigma Ransomware finds no files then it deletes itself and it stops the infection if it finds the country location of  Russian Federation or Ukraine.

Later it connects to its command & control servers and establishes the Tor Connection and  Sigma Ransomware begins to encrypt files on the machine.

After complete encryption, it will display the ransom notes that contains the detailed information of the attack and the attack request the victims to contact them via sigmacs@protonmail.com and also victim need to mention the infection ID.

Also, attack demand the ransom amount via bitcoin and the price will be fixed based on how immediately victims contact to the attack.

“Facing with malware so sophisticated on both sides, social engineering tricks and technical design, is a hard challenge for even security-aware users,” says Fatih Orhan, the Head of Comodo Threat Research Labs.

Latest articles

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

Threat Actors Target Organizations in Thailand with Ransomware Attacks

Thailand is experiencing a significant escalation in ransomware attacks, with both state-sponsored advanced persistent...

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...