Monday, May 12, 2025
HomeCyber Security NewsNew Mamona Ransomware Targets Windows Systems Using Abused Ping Command

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona, which is rapidly spreading across Windows systems.

Unlike traditional ransomware, Mamona employs a unique set of tactics, notably exploiting the humble Windows “ping” command as a timing mechanism, and operates entirely offline, making detection and response more difficult.

Mamona Ransomware in action
Mamona Ransomware in action

Emerging on the Commodity Ransomware Scene

Mamona is the latest entrant in the expanding “commodity ransomware” landscape sector where malware developers sell off-the-shelf ransomware builders to any operator, rather than running high-profile, organized Ransomware-as-a-Service (RaaS) campaigns.

- Advertisement - Google News

This decentralized model has resulted in malware strains that are harder to track and attribute, with new variants appearing almost daily.

Custom encryption logic with no standard crypto 
Custom encryption logic with no standard crypto 

First sighted in campaigns linked to BlackLock affiliates and with connections to the notorious Embargo group, Mamona’s builder was recently leaked online.

Recon routine and ransom note dropping
Recon routine and ransom note dropping

Threat actors have since been observed distributing the ransomware in opportunistic attacks, and the DragonForce group even managed to obtain and leak sensitive configuration files tied to its infrastructure.

Offline Operation, False Threats

What sets Mamona apart from other ransomware is its complete lack of external communication. Analysis confirms there are no Command and Control (C2) channels, data exfiltration, or even meaningful internet connections.

Files receive a new extension
Files receive a new extension

The ransomware operates in “mute mode,” executing all encryption and logic locally. While its ransom note threatens victims with data leaks and public exposure, researchers have found this to be a bluff-Mamona does not attempt to steal files.

“Mamona, R.I.P!”. Ransom note, with a couple of lies
“Mamona, R.I.P!”. Ransom note, with a couple of lies

Mamona’s attack sequence starts with the use of a ping command to the unusual loopback address 127.0.0.7, a simple yet effective technique to delay execution and evade behavioral detection systems.

Following this, it launches a self-deletion routine using cmd.exe, aiming to erase all traces of itself from the victim’s machine. These steps are designed to hamper forensic analysis and incident response.

User files are then encrypted with custom logic-bypassing standard cryptographic libraries-and renamed with a “.HAes” extension.

Ransom notes are scattered throughout the system, and the desktop wallpaper is changed to signal the attack.

Despite its disruptive impact, Mamona’s design choices have unintended benefits for victims: experts have discovered and tested a working decryption tool that can successfully restore files.

The decryption utility, though rudimentary in appearance, has been shown to reverse Mamona’s encryption, thanks to the simplicity and predictability of its locally implemented cryptography.

Security professionals warn that Mamona’s offline operation makes it invisible to traditional network monitors, and its reliance on basic Windows utilities mimics legitimate behavior.

They advise enhancing behavioral analysis on endpoints, maintaining robust offline backups, and educating users on ransomware threats.

Mamona’s rise highlights the growing challenge posed by easily accessible, builder-based ransomware.

As its toolkit spreads, organizations must remain vigilant against attacks that blend technical simplicity with damaging real-world impact.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...