Tuesday, April 22, 2025
Homecyber securityAlbabat Ransomware Expands Reach to Target Linux and macOS Platforms

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

Published on

SIEM as a Service

Follow Us on Google News

A recent report from Trend Micro has revealed that a new variant of the Albabat ransomware now targets Linux and macOS platforms, marking a significant expansion in its capabilities.

Previously limited to Windows systems, this updated strain demonstrates the evolving sophistication of ransomware threats.

The malware is still under active development, with its multi-OS functionality posing heightened risks to organizations with diverse IT environments.

- Advertisement - Google News

New Multi-OS Capabilities Detected in Latest Variant

The ransomware operates by encrypting files on infected endpoints, sparing only those stored in specific system-related directories.

Additionally, it exhibits advanced anti-analysis mechanisms by terminating various system processes, including those related to debugging, virtual machines (VMs), and other security tools.

A notable feature of the new variant is its use of the GitHub REST API to retrieve configuration data, showcasing the attackers’ reliance on legitimate cloud services to evade detection.

Detection and Mitigation Measures

Symantec has identified and implemented protections against this threat through multiple detection technologies.

These include adaptive-based signatures such as ACM.Ps-Http!g2 and ACM.Untrst-Bcdedit!g1, behavior-based detections like SONAR.SuspLaunch!gen4, and machine learning algorithms such as Heur.AdvML.A!300.

VMware Carbon Black products also provide robust defenses by blocking malicious indicators and delaying malware execution for cloud-based scans.

The ransomware has been classified under various threat categories, including Ransom.Albabat and Trojan.Gen.MBT.

Network-based detections are also in place to identify suspicious activities such as connections to GitHub cloud services or malicious applications attempting to access cloud storage.

Organizations are advised to enforce strict endpoint security policies, including blocking all forms of unknown or potentially unwanted programs (PUPs) and leveraging advanced reputation services for real-time threat intelligence.

The addition of Linux and macOS support underscores the growing trend of ransomware developers targeting non-Windows platforms to exploit gaps in multi-OS security strategies.

By leveraging cloud-based services like GitHub for operational purposes, attackers further complicate detection efforts while maintaining operational efficiency.

Organizations are urged to adopt a proactive approach by implementing comprehensive endpoint protection solutions, conducting regular security audits, and ensuring all systems are updated with the latest patches.

As ransomware threats like Albabat continue to evolve, maintaining a layered defense strategy remains critical in mitigating potential damages.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...