{"id":107291,"date":"2022-08-24T10:00:13","date_gmt":"2022-08-24T10:00:13","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=107291"},"modified":"2022-08-24T12:21:20","modified_gmt":"2022-08-24T12:21:20","slug":"ransomware-updates-1-day-exploits","status":"publish","type":"post","link":"https:\/\/securelist.com\/ransomware-updates-1-day-exploits\/107291\/","title":{"rendered":"Ransomware updates & 1-day exploits"},"content":{"rendered":"
In our crimeware reporting service, we analyze the latest crime-related trends we come across. Last month, we again posted a lot on ransomware, but we also covered other subjects, such as 1-day exploits. In this blogpost, we provide excerpts from these reports.<\/p>\n
For questions or more information about our crimeware reporting service, please contact crimewareintel@kaspersky.com<\/a>.<\/p>\n RedAlert (aka N13V) is the latest in the multiplatform ransomware trend we described here<\/a> and here<\/a>. The difference this time, though, is that it is not written in a cross-platform language but in C \u2014 at least the Linux version that we could get our hands on, was. It does, however, explicitly support ESXi environments. For example, it has the command-line option “-w”, which stops running VMs, and it also searches for VMWare-based VMs as can be seen from the screenshots below.<\/p>\n <\/a><\/p>\n Note the specific VMWare-related strings the malware looks for<\/em><\/strong><\/p>\n <\/a><\/p>\n Stopping VMs<\/em><\/strong><\/p>\n Interestingly, the group mentions on their onion website that a decryptor is available on all platforms. Unfortunately, we could not get our hands on the other versions, so we don’t know whether the decryptor is written in a cross-platform language or not.<\/p>\n Another aspect that sets RedAlert apart from other ransomware groups is that they only accept payments in Monero. From a criminal point of view, the advantage is that payments cannot be traced. The problem, however, is that Monero is not accepted in every country or by every exchange, making a ransom payment more difficult for the victim.<\/p>\n Since the group is relatively young, we couldn’t find out a lot about the victimology, but RedAlert stands out as an interesting example of a group that managed to adjust their code written in C to different platforms.<\/p>\n In July, our Darknet monitoring system detected yet another new cross-platform ransomware variant: Monster. There are a couple of peculiar properties about Monster. First, unlike other new ransomware families that are written in modern cross-platform languages (e.g. Rust, Go), Monster is written in Delphi. Second, the malware has a GUI.<\/p>\n This latter property is especially peculiar, as we do not remember seeing this before. There are good reasons for this, because, why would one go through the effort of implementing this when most ransomware attacks are executed using the command line in an automated way during a targeted attack? The ransomware authors must have realized this as well, since they included the GUI as an optional command-line parameter.<\/p>\nRedAlert \/ N13V: yet another multiplatform ransomware variant<\/h2>\n
Monster: Ransomware with a GUI<\/h2>\n