Friday, January 31, 2025
HomeRansomwareCerber Ransomware Comes again to Steal Passwords from Browsers and Crypto Wallets

Cerber Ransomware Comes again to Steal Passwords from Browsers and Crypto Wallets

Published on

SIEM as a Service

Follow Us on Google News

Cerber ransomware which gained popularity and evolved one of the fast growing ransomware families that infiltrate the system and encrypts various file types including .jpg, .doc, .raw, .avi, etc.

It adds a .cerber extension to each encrypted file. Following successful infiltration, Cerber demands a ransom payment to decrypt these files.

Also Read A complete Lookback of Historical Wannacry Ransomware Cyber Attack

Next to WannaCry and SambaCry Cerber is one of the most popular and continuously evolving ransomware.

Ransomware distributed through Email through attachements includes file (JS_NEMUCOD.SMGF2B) which downloads Cerber variant(identified by Trend Micro as RANSOM_HPCERBER.SMALY5A).
Cerber Ransomware Comes again to Steal browser Passwords
Cerber Email Source: TrendMicro

It follows wallet files of three famous Bitcoin variant applications following files type wallet.dat (Bitcoin), *.wallet (Multibit), electrum.dat (Electrum).

Cerber Ransomware Evolves again and Targetting Bitcoin Wallets
CERBER 2.0 WAS SPOTTED IN AUGUST (ENCRYPT FILES).
CERBER 4.0 SPOTTED IN OCTOBER (WHICH KILLS DATABASE PROCESS MYSQL,MSSQL,ORACLE).
CERBER 4.1.6 SPOTTED IN NOVEMBER 23RD (ENCRYPTING DATABSES).
CERBER 5.0 SPOTTED IN NOVEMBER 24 (CONSIST OF VB SCRIPT AS ADDITIONAL FEATURE WHICH IMPLEMENTS COMMUNICATION CHANNEL).

Cerber doesn’t steal Bitcoin’s from wallets instead it tries to steal the wallet passwords.It also tries to steal the passwords from the browsers. Once it steals password it transfers the information to C&C Servers.

Also Read SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices

Information theft carried before encryption to occur. Also, it uses to delete the wallet files once it passed to C&C servers.

This new improvement clearly states that attackers trying to monetize with the ransomware.

Common Defence’s to stay safe

  • Don’t open the attachments that you are not expecting.
  • Patch or Update your software.
  • Use a reputable security suite.
  • Download applications from Reputed sites.
  • Stay strict with CIA Cycle.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded...

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity...