Saturday, July 20, 2024
EHA

New Variant of Scarab Ransomware Distributed via RDP on Systems and Servers

Security researchers from Malwarebytes detected Scarab ransomware variant distributed through RDP and used AES algorithm for encryption. The Scarabey variant is written in Delphi and it is identical to Scarab version the only change is the addresses of code and memory data references.

The popular version of the Scarab Ransomware distributed by a Necurs botnet and it is written in C. Scarabey found targetting Russian users and is designed same as like any other ransomware demanding Bitcoin.

The main difference between them is the ransom note, with Scarab it is written in English and on Scarabey it is written in Russian. Scarab uses to warn the users to make payment soon else the price will increase, on the other hand, Scarabey warns more and more files will be encrypted.

Researchers said There is no backdoor or remote access code in scarab or its variants, which makes the threat of deleting files on victim’s computer impossible.

Execution Flow – Scarabey

It checks with the parameters before executing to ensure this is the first run, also it makes sure there is key process is running. If any key process found it kills the process to avoid having the file locked.

Encryption loops called multiple sections in the code, but the main loop performs the majority of the encryption. It goes through all the folders if the file is not .exe or .dll it encrypts and changes to the .scarab extension.

It doesn’t use crypto  APIs instead it uses AES algorithm for encryption. Malwarebytes provided technical analysis of the ransomware.

“The key used to encrypt changes from file to file. Meaning that two files with identical content will be different after encryption. Essentially what happens is that there is an initial key and many subkeys are derived from that key.
If just a single encryption key was used for all of the files, you would be able to capture the memory at any point in the encryption process, save the key, and use it to decrypt all of the files on your hard drive. Unfortunately, because of this key cycling that Scarab performs, it makes decryption of the files likely impossible.” researchers said.

Once the disk drive encryption completed it calls to the enumeration functions to locate the network drives and folders.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles