Wednesday, May 7, 2025
HomeComputer SecurityHERMES Ransomware Spreading Through Password Protected Word Documents and XPS

HERMES Ransomware Spreading Through Password Protected Word Documents and XPS

Published on

SIEM as a Service

Follow Us on Google News

A new Email campaign spotted by Trustwave spreading HERMES Ransomware through password protected word document to encrypt the system files and lock the victim’s computer. Hermes Ransomware distributed in wild nowadays with newly updated features and targets various countries.

The attachment named “Invoice.doc” contains the password protected macro if the user has security setting is Low then the macro will be launched automatically.

HERMES Ransomware 2.1

Once the macro is triggered it downloads a file from the Command and control server[hxxp://209[.]141[.]59[.]124/azo.exe] and the downloaded file save to temp folder and executed. The [azo.exe] downloads the final payload which is the HERMES 2.1 Ransomware.

- Advertisement - Google News
HERMES Ransomware 2.1

Hermes doesn’t append its own file extension as like any other ransomware it used symmetric algorithm AES to encrypt files and RSA to protect AES key. Once the infection completed it launches DECRYPT_INFORMATION.html which shows the ransom note.

Ransom note indicates that the victim’s files are encrypted using an RSA2048 algorithm and asks victim’s to pay through Bitcoin or other cryptocurrencies. Also, attackers added “you can decrypt one file for free” to make victims believe they can decrypt the files.

Trustwave also spotted the same email sample contains attachment as XPS file “invoice.xps” and it has FixedPage.NavigateUri property which directs users to “hxxp://rainbowrealty[.]com/ads/herewego.html” when it was clicked. The page appears to be removed now and it doesn’t exist.

Unfortunately, the decrypter tool is available only for variants of Hermes 1.0 and it is not available for Hermes 2.x variants. The best options are to restore data from the backups.

Also Read

Cyber Criminals Launch Hermes Ransomware Via Password Protected Word Documents

Hermes Ransomware Distributed Through Malicious Office Documents Embedded Flash Exploit

Ryuk Ransomware Attack on various Enterprise Network Around the World & Earned $640,000

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Healthcare Sector Becomes a Major Target for Cyber Attacks in 2025

The healthcare sector has emerged as a prime target for cyber attackers, driven by...

SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution

Security researchers have disclosed a chain of critical vulnerabilities affecting SysAid ITSM’s On-Premise solution,...

CISA Warns of Cyber Threats to Oil and Gas SCADA and ICS Networks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert warning critical...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce: Emerging Hybrid Cyber Threat in the 2025 Ransomware Landscape

DragonForce has swiftly risen as a formidable player in 2025, embodying a hybrid threat...

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider,...

Ransomware Attacks on Food & Agriculture Industry Surge 100% – 84 Attacks in Just 3 Months

The food and agriculture industry is facing an unprecedented wave of cybersecurity threats in...