Wednesday, May 8, 2024

This new ransomware is targeting Windows and Linux PCs with a ‘unique’ attack

Must Read

Different COVID-19 Vaccines

Different COVID-19 Vaccines Authorized and Recommended Vaccines Currently, three vaccines are...

What Is Happening Between Facebook & Advertisers As Mark Zuckerberg Is Losing Out On Millions?

The Stop Hate For Profit campaign is also spilling over on to Twitter, TikTok and more. At...

Your AC train travel is set to change! Indian Railways to revamp its air-conditioned coaches; here’s why

The experiment was conducted on 15 pairs of AC trains being run by the national transporter on...

Researchers detail the unusual workings of Tycoon ransomware – which appears to be designed to stay under the radar as much as possible.

This new ransomware is targeting Windows and Linux PCs with a 'unique' attack

A newly uncovered form of ransomware is going after Windows and Linux systems in what appears to be a targeted campaign.

Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique that helps stay hidden on compromised networks. 

Tycoon has been uncovered and detailed by researchers at BlackBerry working with security analysts at KPMG. It’s an unusual form of ransomware because it’s written in Java, deployed as a trojanised Java Runtime Environment and is compiled in a Java image file (Jimage) to hide the malicious intentions.

“These are both unique methods. Java is very seldom used to write endpoint malware because it requires the Java Runtime Environment to be able to run the code. Image files are rarely used for malware attacks,” Eric Milam, VP for research and intelligence at BlackBerry, told ZDNet.

“Attackers are shifting towards uncommon programming languages and obscure data formats. Here, the attackers did not need to obscure their code but were nonetheless successful in accomplishing their goals,” he added.

However, the first stage of Tycoon ransomware attacks is less uncommon, with the initial intrusion coming via insecure internet-facing RDP servers. This is a common attack vector for malware campaigns and it often exploits servers with weak or previously compromised passwords.

Once inside the network, the attackers maintain persistence by using Image File Execution Options (IFEO) injection settings that more often provide developers with the ability to debug software. The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

Different COVID-19 Vaccines

Different COVID-19 Vaccines Authorized and Recommended Vaccines Currently, three vaccines are...

What Is Happening Between Facebook & Advertisers As Mark Zuckerberg Is Losing Out On Millions?

The Stop Hate For Profit campaign is also spilling over on to Twitter, TikTok and more. At this time, Starbucks, Coca Cola,...

Your AC train travel is set to change! Indian Railways to revamp its air-conditioned coaches; here’s why

The experiment was conducted on 15 pairs of AC trains being run by the national transporter on the Rajdhani rail routes since...

Apps ban: Retaliatory step signals intent, blocks China access to growing youth market

Banning 59 mobile apps that have Chinese overhang is both a statement of intent and a strong signal. This may not hurt...

Coronavirus vaccine update: From Oxford vaccine trials happening in Brazil to Remdesivir usage

1. From Oxford vaccine to Remdesivir usage, here are all the updates you need to know
- Advertisement -

More Articles Like This

- Advertisement -