Friday, January 3, 2025
HomeCVE/vulnerabilityHelldown Ransomware Attacking Windows And Linux Servers Evading Detection

Helldown Ransomware Attacking Windows And Linux Servers Evading Detection

Published on

SIEM as a Service

Helldown Ransomware, a sophisticated cyber threat, actively targets critical industries worldwide by leveraging advanced cross-platform capabilities, including Windows and Linux, to encrypt files and exploit system vulnerabilities. 

Its modular design and anti-detection techniques enable continuous evolution and persistent attacks, which makes it a significant threat to global cybersecurity, demanding immediate attention and robust mitigation strategies.

Leak site of Ransomware

Helldown ransomware, detected in August 2024, encrypts files, renames them, and demands a ransom, whose Windows executable, a 32-bit GUI application, drops a batch script to terminate processes and delays execution.

- Advertisement - SIEM as a Service

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

It uses anti-analysis techniques, including checking for virtual machine environments, to evade detection and impede security analysis.

Process tree

It implements multiple anti-debugging techniques to hinder analysis and debugging efforts by modifying the Windows registry to disable Volume Shadow Copy Service, preventing the creation of system restore points. 

By encrypting critical system and user files, it changes their extensions to .FGqogsxF and icons to evade detection. Finally, the ransomware self-destructs and restarts the compromised system to cover its tracks. 

Encrypted files

The Helldown ransomware, which is an executable in the 64-bit ELF format, makes use of configuration data that is hardcoded in order to target particular file extensions. 

In order to avoid being detected by a sandbox, it uses sleep functions and executes shell commands, such as the `touch` command, which allows it to manipulate timestamps. 

The ransomware encrypts targeted files and drops a ransom note, which has the capability to kill virtual machines to gain write access, but this feature was not activated during analysis. 

Ransom note

Cyfirma research reveals that threat actors are actively exploiting vulnerabilities in Zyxel firewalls, particularly CVE-2024-42057, to gain unauthorized access, which involve creating malicious accounts and uploading backdoors like “zzz1.conf” to compromised devices. 

The attacks have resulted in successful breaches and forced some organizations to replace their affected firewalls, highlighting the urgent need for organizations to patch their Zyxel firewalls promptly and implement robust security measures to mitigate these risks.

Helldown ransomware, a recent threat actor, has rapidly targeted various industries, including Real Estate & Construction, IT, and Manufacturing sectors, which have been hit the hardest, with five, three, and three victims, respectively. 

Critical sectors like Healthcare, Energy, and Transportation are also on the list, indicating a widespread attack on essential services and businesses, underscoring the significant threat Helldown ransomware poses to diverse organizations.

To enhance cybersecurity, implement strong security protocols, encryption, access controls for critical systems, and maintain regular backups. 

Develop a comprehensive data breach prevention plan, addressing data types, remediation, storage, and notification requirements by adopting zero-trust architecture and MFA.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...