Monday, June 24, 2024

Massive Sigma Ransomware Attack From Russia-Based IPs and Lock the Victims Computers

Newly discovered Sigma Ransomware spreading from Russia-based IP’s with the variety of social engineering techniques to compromise victims and lock the infected computer.

Users Targeting via malicious SPAM Emails that contain a statement which comes from “United States District Court” with a malicious attachment.

Nowadays attackers using the Email scam to target the victim to perform various malicious activities and playing with the user by some emergency strings of fear and increase the victim’s curiosity.

Sigma Ransomware Attack conducted from around 32 Russian based IP’s and the attacker registered the specific domain which is specified using to perform various attacks.

Malware authors used more obfustication functions by requesting the password to open the file evade the detection.

Sigma Ransomware Working Function

Initially, the Malicious files required a password to open because it tricks the user to download the attachment that should be protected since the mail come from the court, a clever trick used by an attacker.

If it Finds the Macros are turned off on the victim’s machine then it convenience the users to turn it on which contains malicious VBScript.

Later on, VBScript will download the original Sigma Ransomware payload from attack command and control server and save it into  %TEMP% folder.

Downloaded malware mimics as a legitimate  svchost.exe process which helps to download one more malware.

The Malware used various of obfuscation technique to hide it and evade the detection and it kills itself if it finds ay virtual machine or sandboxes.

According to Comodo Research, Unlike some of its close ransomware relatives, Sigma does not act immediately but lurks and makes covert reconnaissance first. It creates a list of valuable files, counts them and sends this value to its C&C server along with other information about the victim’s machine.

Also if the sigma Ransomware finds no files then it deletes itself and it stops the infection if it finds the country location of  Russian Federation or Ukraine.

Later it connects to its command & control servers and establishes the Tor Connection and  Sigma Ransomware begins to encrypt files on the machine.

After complete encryption, it will display the ransom notes that contains the detailed information of the attack and the attack request the victims to contact them via [email protected] and also victim need to mention the infection ID.

Also, attack demand the ransom amount via bitcoin and the price will be fixed based on how immediately victims contact to the attack.

“Facing with malware so sophisticated on both sides, social engineering tricks and technical design, is a hard challenge for even security-aware users,” says Fatih Orhan, the Head of Comodo Threat Research Labs.

Website

Latest articles

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB...

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve,...

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying...

Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay...

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef....

Chinese Winnti Group Intensifies Financially Motivated Attacks

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential...

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles