LV malware uses binaries of hack group REvil without permission

Secureworks researchers have discovered a strange precedent: the developers of the LV ransomware seem to be pirating and using the binaries of the more famous hack group REvil.

According to experts, LV operators somehow managed to get their hands on the binary that is responsible for the actual encryption during the REvil attacks. The hackers then used a hex editor to modify this binary and its configuration file. The result of these modifications, in fact, has become a new version of the REvil ransomware, which IS experts have been discovering since the beginning of 2021 and are tracking under the name LV.

Analysts write that the similarities between the LV and REvil sources were immediately obvious, but now they have examined the LV code in detail. So, it turned out that even the remnants of a code block in which REvil insults two well-known malware analysts have been preserved in LV.

LV uses REvil

Secureworks concludes that LV operators appear to have modified the beta version of REvil 2.03, which eventually became the LV ransomware. At the same time, it is noted that, despite the theft of the malware code, the LV hack group is still not like REvil in terms of internal infrastructure. For example, LV removed from the code the C&C servers that REvil used to track infections, but did not replace them with its own, leaving this section blank.

LV may not be able to maintain the management infrastructure and develop the internal automation needed to process and track victim data.experts say.

It has also been noted that the group’s darknet sites, where LV victims are asked to pay a ransom, often do not work and return errors when victims or analysts try to access them. Secureworks believes this may indicate that LV is “struggling to maintain a resilient infrastructure, but suffers from a lack of skills or resources.”

In addition, LV has tried to mimic REvil by creating its own “leak sites” where hackers threaten to publish victims’ data if they do not pay the ransom. Many cybercriminals do this, but Secureworks notes that the group never shared information about its victims, listed on the “leak sites”, to anyone. That is, in fact, the group may not have the ability to store the stolen data at all.

LV uses REvil

At the same time, LV had two such sites for leaking information, and each of them listed different victims, with the exception of one entry. Reasons for doing it are still unclear.

As for the REvil gang, Secureworks believes that the binary piracy incident could push the group to make the code more complex and strengthen security (in order to prevent possible modifications to the configuration files in the future), which could significantly complicate the work of information security experts.

Let me remind you that I also talked about the fact that MountLocker ransomware uses Windows API to navigate the network.

Helga Smith

I was always interested in computer sciences, especially data security and the theme, which is called nowadays "data science", since my early teens. Before coming into the Virus Removal team as Editor-in-chief, I worked as a cybersecurity expert in several companies, including one of Amazon's contractors. Another experience: I have got is teaching in Arden and Reading universities.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button