Categories: Ransomware

A New Ransomware Dubbed BlackCocaine Uses AES & RSA Encryption Methods

Recently, an Indian IT company that is specialized in the Banking and Financial Services sector, Nucleus Software has suffered a security breach on May 30, 2021, as reported by the cybersecurity experts at Cyble.

However, Nucleus Software has already reported the Bombay Stock Exchange (BSE) and the National Stock Exchange of India (NSEI) about this security breach. 

The company noted that the probability of financial data leak is dubious, as Nucleus Software has confirmed that they don’t store any financial data of its customers.

During the investigation, the security researchers at Cyble has discovered that this cyber attack is executed by the group behind the BlackCocaine Ransomware, and from the below image you can see the compromised page of BlackCocaine ransomware.

Technical Analysis

Here, the analysts assert that the first victim of the BlackCocaine ransomware group is Nucleus Software and they have also revealed the malicious website of BlackCocaine ransomware group:-

  • hxxp://blackcocaine[.]top/

On May 28, 2021, the above-mentioned domain name was registered by the BlackCocaine ransomware group. The security authorities at Cyble discovered the BlackCocaine ransomware sample files during their routine exercises.

The operators of BlackCocaine ransomware have used the MinGW tool to compile the ransomware payload file that is a UPX-packed 64-bit Windows executable file. 

While the threat actors have used the Go language to program this malicious executable, and on May 29, 2021, the operators behind this attack have compiled this executable file. 

After manually extracting the ransomware payload, the experts concluded that to evade several security analysis tools and make this more complicated threat actors have used various anti-VM and anti-debugging methods.

Here, while encrypting the victim documents to perform file system inventory, the BlackCocaine ransomware decrypts Windows APIs. After completing this stage, it automatically affixes the “.BlackCocaine” extension to the filenames of each encrypted file.

Moreover, cybersecurity researchers have concluded that in this attack the AES and RSA Encryption methods are used by the operators behind this BlackCocaine ransomware. 

After the successful encryption process, on the infected system, the threat actors drops a ransom note:- 

  • “HOW_TO_RECOVER_FILES.BlackCocaine.txt”

Recommendations

The experts have suggested few recommendations and here they are mentioned below:-

  • To track and block the malware infection always use the shared IoCs.
  • Use strong passwords.
  • Use multi-factor authentication.
  • Turn on the automatic software update.
  • Use security tools.
  • Avoid opening untrusted links and email attachments.
  • Use the service provided by the AmiBreached.com portal to track your exposure in the Darkweb.

The BlackCocaine ransomware is one of the active and sophisticated malware strains; but, to lock the data and demand ransom from the victim the BlackCocaine uses the same standard of server-side encryption method.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…

5 hours ago

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…

6 hours ago

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…

6 hours ago

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…

6 hours ago

New Windows Zero-Day Vulnerability Let Attackers Steal Credentials From Victim’s Machine

A security researcher discovered a vulnerability in Windows theme files in the previous year, which…

6 hours ago

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…

6 hours ago