Categories: Ransomware

A New Ransomware Dubbed BlackCocaine Uses AES & RSA Encryption Methods

Recently, an Indian IT company that is specialized in the Banking and Financial Services sector, Nucleus Software has suffered a security breach on May 30, 2021, as reported by the cybersecurity experts at Cyble.

However, Nucleus Software has already reported the Bombay Stock Exchange (BSE) and the National Stock Exchange of India (NSEI) about this security breach. 

The company noted that the probability of financial data leak is dubious, as Nucleus Software has confirmed that they don’t store any financial data of its customers.

During the investigation, the security researchers at Cyble has discovered that this cyber attack is executed by the group behind the BlackCocaine Ransomware, and from the below image you can see the compromised page of BlackCocaine ransomware.

Technical Analysis

Here, the analysts assert that the first victim of the BlackCocaine ransomware group is Nucleus Software and they have also revealed the malicious website of BlackCocaine ransomware group:-

  • hxxp://blackcocaine[.]top/

On May 28, 2021, the above-mentioned domain name was registered by the BlackCocaine ransomware group. The security authorities at Cyble discovered the BlackCocaine ransomware sample files during their routine exercises.

The operators of BlackCocaine ransomware have used the MinGW tool to compile the ransomware payload file that is a UPX-packed 64-bit Windows executable file. 

While the threat actors have used the Go language to program this malicious executable, and on May 29, 2021, the operators behind this attack have compiled this executable file. 

After manually extracting the ransomware payload, the experts concluded that to evade several security analysis tools and make this more complicated threat actors have used various anti-VM and anti-debugging methods.

Here, while encrypting the victim documents to perform file system inventory, the BlackCocaine ransomware decrypts Windows APIs. After completing this stage, it automatically affixes the “.BlackCocaine” extension to the filenames of each encrypted file.

Moreover, cybersecurity researchers have concluded that in this attack the AES and RSA Encryption methods are used by the operators behind this BlackCocaine ransomware. 

After the successful encryption process, on the infected system, the threat actors drops a ransom note:- 

  • “HOW_TO_RECOVER_FILES.BlackCocaine.txt”

Recommendations

The experts have suggested few recommendations and here they are mentioned below:-

  • To track and block the malware infection always use the shared IoCs.
  • Use strong passwords.
  • Use multi-factor authentication.
  • Turn on the automatic software update.
  • Use security tools.
  • Avoid opening untrusted links and email attachments.
  • Use the service provided by the AmiBreached.com portal to track your exposure in the Darkweb.

The BlackCocaine ransomware is one of the active and sophisticated malware strains; but, to lock the data and demand ransom from the victim the BlackCocaine uses the same standard of server-side encryption method.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

20 hours ago