Categories: Ransomware

Massive Sigma Ransomware Attack From Russia-Based IPs and Lock the Victims Computers

Newly discovered Sigma Ransomware spreading from Russia-based IP’s with the variety of social engineering techniques to compromise victims and lock the infected computer.

Users Targeting via malicious SPAM Emails that contain a statement which comes from “United States District Court” with a malicious attachment.

Nowadays attackers using the Email scam to target the victim to perform various malicious activities and playing with the user by some emergency strings of fear and increase the victim’s curiosity.

Sigma Ransomware Attack conducted from around 32 Russian based IP’s and the attacker registered the specific domain which is specified using to perform various attacks.

Malware authors used more obfustication functions by requesting the password to open the file evade the detection.

Sigma Ransomware Working Function

Initially, the Malicious files required a password to open because it tricks the user to download the attachment that should be protected since the mail come from the court, a clever trick used by an attacker.

If it Finds the Macros are turned off on the victim’s machine then it convenience the users to turn it on which contains malicious VBScript.

Later on, VBScript will download the original Sigma Ransomware payload from attack command and control server and save it into  %TEMP% folder.

Downloaded malware mimics as a legitimate  svchost.exe process which helps to download one more malware.

The Malware used various of obfuscation technique to hide it and evade the detection and it kills itself if it finds ay virtual machine or sandboxes.

According to Comodo Research, Unlike some of its close ransomware relatives, Sigma does not act immediately but lurks and makes covert reconnaissance first. It creates a list of valuable files, counts them and sends this value to its C&C server along with other information about the victim’s machine.

Also if the sigma Ransomware finds no files then it deletes itself and it stops the infection if it finds the country location of  Russian Federation or Ukraine.

Later it connects to its command & control servers and establishes the Tor Connection and  Sigma Ransomware begins to encrypt files on the machine.

After complete encryption, it will display the ransom notes that contains the detailed information of the attack and the attack request the victims to contact them via sigmacs@protonmail.com and also victim need to mention the infection ID.

Also, attack demand the ransom amount via bitcoin and the price will be fixed based on how immediately victims contact to the attack.

“Facing with malware so sophisticated on both sides, social engineering tricks and technical design, is a hard challenge for even security-aware users,” says Fatih Orhan, the Head of Comodo Threat Research Labs.

Priya James

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

20 hours ago