Wednesday, February 26, 2025
HomeCyber CrimeHackers Use New Ransomware that Encrypts Files & Steals Tokens From Victim’s...

Hackers Use New Ransomware that Encrypts Files & Steals Tokens From Victim’s Machine

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at Cyble recently identified that the authors of ransomware now have access to a brand new malicious tool – AXLocker – which has the ability to encrypt and make the multitude of file types unusable.

As one of the most profitable and important malware families for threat Actors, ransomware has rapidly become one of the most important threat types.

Attack Flow

There are three new ransomware families of the following were uncovered: AXLocker, Octocrypt, and Alice Ransomware.

Attackers behind the AXLocker ransomware steal the discord tokens and accounts of infected users. After encrypting files on the victim’s computer, a ransom note is portrayed. This note gives the victim instructions on how to obtain the decryption tool. Cyble researchers said via technical report.

Discord tokens stolen by hackers can be used to perform the following actions:

  • Log in as the user
  • Obtain information about the associated account by issuing API requests

NFT platforms and cryptocurrency groups have turned to Discord as a preferred community for communication. 

So, it’s obvious that an attacker could make use of the Discord moderator token as well as the tokens of other verified community members to carry out scams and steal funds through fraudulent use of them.

The new AXLocker ransomware has been marked as one of the most sophisticated malware since it steals Discord tokens of its victims along with encrypting the files of their victims.

While the threat actors who use this malicious tool do not possess any particular sophistication when it comes to their actions.

After the ransomware has been executed, it encrypts files by calling a function called startencryption() on the system which hides its presence by modifying the attributes of its files.

A startencryption() function is responsible for enumerating the available directories on the C:/ drive and finding files in them by using the code contained in the function. 

The encryption process is controlled by looking for encryptable file extensions and excluding a list of directories from being encrypted.

This is followed by the ransomware calling the ProcessFile function, which will then execute the EncryptFile function that encrypts the system files of the victim by using the fileName as the argument.

The AES algorithm is used by AXLocker when encrypting files. However, the encrypted files do not have any extension appended to their filenames, so they appear with the same names as the original.

Then it uses a webhook URL through which it sends the following data to the Discord channel that’s under the control of the threat actors:-

  • Victim ID
  • System details
  • Data stored in browsers
  • Discord tokens

While apart from this security analysts also detected two more ransomware families and here they are mentioned below:-

  • Octocrypt Ransomware
  • Alice Ransomware

There is a RaaS (Ransomware-as-a-Service) business model behind both of this ransomware. All Windows versions are targeted by these new variants of ransomware.

Targeted Directories

Among the directories targeted by the malware for stealing Discord tokens are the following ones:-

  • Discord\Local Storage\leveldb
  • discordcanary\Local Storage\leveldb
  • discordptb\leveldb
  • Opera Software\Opera Stable\Local Storage\leveldb
  • Google\Chrome\User Data\\Default\Local Storage\leveldb
  • BraveSoftware\Brave-Browser\User Data\Default\Local Storage\leveldb
  • Yandex\YandexBrowser\User Data\Default\Local Storage\leveldb

However, it is important to note that although this ransomware is primarily directed at consumers, but, still it could pose a substantial threat to large communities and enterprises as well.

Recommendations

Here below we have mentioned all the recommendations offered by the experts:-

  • Backups should be conducted regularly.
  • Make sure to store your backups in the cloud or on a separate network.
  • It is recommended that you enable automatic software updates on your computer, mobile phone, and any other connected devices whenever possible and practical.
  • Your connected devices, like your computer, laptop, and mobile phone, should be protected with a reputable anti-virus and Internet security software package.
  • Make sure you verify the authenticity of email attachments and links before opening them.
  • Devices that are infected on the same network should be disconnected.
  • Ensure that external storage devices are disconnected if they are connected.
  • Make sure that system logs are checked for suspicious activity.
  • We recommend reading Ransomware Attack Response and Mitigation Checklist.

Managed DDoS Attack Protection for Applications – Download Free Guide

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...