Thursday, April 17, 2025
HomeMalwareFake Windows Updater Bypass Email Gateways To Launch Cyborg Ransomware On Windows...

Fake Windows Updater Bypass Email Gateways To Launch Cyborg Ransomware On Windows PC

Published on

SIEM as a Service

Follow Us on Google News

New malspam email campaign discovered with fake windows updater and its Builder, through which hackers launching Cyborg Ransomware to encrypt the compromised systems files.

A spam email claims to be from Microsoft and email body urges the victims to Install the Latest “Microsoft Windows Update” by opening the attached file.

Fake update attachment appears with a random name although having a “.jpg” file extension, but is actually an executable file with the file size of 28KB.

- Advertisement - Google News

Once the victims execute the file, a .NET downloader that will drop another malware on compromised victims’ computers.

Researchers found #Strings section that gives major clues to the executable’s behaviors. One of the notable things is that the hoax Microsoft update will download another executable file from GitHub.

Cyborg Ransomware Behaviour

The main ransomware file bitcoingenerator.exe downloaded from the Github account named misterbtc2020 and the file is .NET compiled malware, the Cyborg ransomware.

Cyborg Ransomware

Successful execution will encrypt the infected user’s system and “.777” has been appended to the encrypted files’ filenames.

Once the ransomware completes the encryption process, the ransomware notes will be dropped into the Desktop.

Ransom note demands victims to send $500 to their bitcoin wallet and also request victims to reach the attack via email.

Trustwave researchers also found 3 more samples, “The file extension these Cyborg ransomware samples will append to the encrypted files varies as observed from the samples found on VT. This is an indication that a builder for this ransomware exists. “

Cyborg Ransomware

Attackers using newly created GitHub account which contains 2 repo’s  Cyborg-Builder-Ransomware, and Cyborg-russian-version.

“The Ransomware can be created and spread by anyone who gets hold of the builder. It can be spammed using other themes and be attached in different forms to evade email gateways.” Trustwave said.

You can also read the complete Ransomware Attack Response and Mitigation Checklist.

Indicator of Compromise

SHA1: 34BAC75C515CAC706ED0D9EF5BA8B76E60FF78F7
SHA1: 8E830F5C5D144CBE7554C91A846A20ACA6322C60
SHA1: 496063408CD61466614CC8370A6687D6F8D45663
SHA1: 50E15A5AAE1C45BE13B4F9B23A6596A822B378A2
SHA1: DF4A3733D76D96BF1A646AD4F807AB668A88A3DC

Cyborg Builder Ransomware V 1.0.7z (2522495 bytes)
SHA1: 7E251FA01E11A7240856C4934714B40B9EF519EF
Cyborg Builder Ransomware V 1.0.exe (2630144 bytes)
SHA1: 8599C32E71D39BBD89B7FCAE419FDF4619A6D2F3

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging...

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

Intel Corporation has announced the divestiture of a 51% stake in its Altera division...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging...

NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks

In the modern enterprise, network security teams face the daunting challenge of detecting and...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...