Friday, March 28, 2025
Homecyber securityAlbabat Ransomware Expands Reach to Target Linux and macOS Platforms

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

Published on

SIEM as a Service

Follow Us on Google News

A recent report from Trend Micro has revealed that a new variant of the Albabat ransomware now targets Linux and macOS platforms, marking a significant expansion in its capabilities.

Previously limited to Windows systems, this updated strain demonstrates the evolving sophistication of ransomware threats.

The malware is still under active development, with its multi-OS functionality posing heightened risks to organizations with diverse IT environments.

New Multi-OS Capabilities Detected in Latest Variant

The ransomware operates by encrypting files on infected endpoints, sparing only those stored in specific system-related directories.

Additionally, it exhibits advanced anti-analysis mechanisms by terminating various system processes, including those related to debugging, virtual machines (VMs), and other security tools.

A notable feature of the new variant is its use of the GitHub REST API to retrieve configuration data, showcasing the attackers’ reliance on legitimate cloud services to evade detection.

Detection and Mitigation Measures

Symantec has identified and implemented protections against this threat through multiple detection technologies.

These include adaptive-based signatures such as ACM.Ps-Http!g2 and ACM.Untrst-Bcdedit!g1, behavior-based detections like SONAR.SuspLaunch!gen4, and machine learning algorithms such as Heur.AdvML.A!300.

VMware Carbon Black products also provide robust defenses by blocking malicious indicators and delaying malware execution for cloud-based scans.

The ransomware has been classified under various threat categories, including Ransom.Albabat and Trojan.Gen.MBT.

Network-based detections are also in place to identify suspicious activities such as connections to GitHub cloud services or malicious applications attempting to access cloud storage.

Organizations are advised to enforce strict endpoint security policies, including blocking all forms of unknown or potentially unwanted programs (PUPs) and leveraging advanced reputation services for real-time threat intelligence.

The addition of Linux and macOS support underscores the growing trend of ransomware developers targeting non-Windows platforms to exploit gaps in multi-OS security strategies.

By leveraging cloud-based services like GitHub for operational purposes, attackers further complicate detection efforts while maintaining operational efficiency.

Organizations are urged to adopt a proactive approach by implementing comprehensive endpoint protection solutions, conducting regular security audits, and ensuring all systems are updated with the latest patches.

As ransomware threats like Albabat continue to evolve, maintaining a layered defense strategy remains critical in mitigating potential damages.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...