Friday, December 6, 2024
HomeComputer SecurityGandcrab Ransomware Attack on Chinese Government Internal Network

Gandcrab Ransomware Attack on Chinese Government Internal Network

Published on

SIEM as a Service

Hackers launched ransomware attacks on Chinese Government department and infected their internal computer network to lock the file and demand the ransom.

The Gandcrab Ransomware is a widespread Ransomware, nowadays it evolves with newly updated features under constant development, to target various countries.

Cybercriminals initiated this attack from outside of the country to target the government departments network.

- Advertisement - SIEM as a Service

The attack starts from March 11, 2019, using recently updated GANDCRABV5.2 latest upgraded ransomware version in February 2019 with newly added functionalities.

Gandcrab ransomware was distributed through various form of attacks such as social media campaigns, exploit kit, weaponized office documents, and compromised websites.

In this case, attackers launched this ransomware via spam email campaign with a malicious file attachment which has dropped into the Chinese Government network.

China’s National Network and Information Security Information Center have reported to the country officials that attackers are targeting government department website emails to drop this Gandcrab ransomware.

Malicious Emails contain version 5.2 of the GandCrab ransomware hidden as an archive named “03-11-19.rar.”

Further investigation reveals that it will encrypt the hard disk data of the user host and let the victim user access the URL to download the Tor browser.

In this case, Attackers demand the ransom via digital currency, for that ransomware open the digital currency payment window and asks the victim to pay the ransom.

The demanded ransom sum is not disclosed in the statement and Chinese government officials are yet to disclose the damages that caused by this Ransomware attacks.

All units are required to conduct risk warnings, investigate, and report any future attacks. Officials said.

Related Read : Ransomware Attack Response and Mitigation Checklist

Previous GandCrab Ransomware Attacks

Torrents Sites Banned A Famous “CrackNow” Torrent Uploader that sharing GandCrab Ransomware

Beware of Malicious Word Documents that Downloads the Ursnif Malware and GandCrab Ransomware

Hackers Launching Fallout Exploit Kit with New Flash Exploits That Delivers GandCrab Ransomware

Hackers Launching Gandcrab Ransomware via Super Mario Image Using Weaponized Excel Document

New Malvertising Chain that Steals Confidential Information and Encrypts With GandCrab Ransomware

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...