Araştırmacılar yeni DarkRadiation fidye yazılımı konusunda uyardı

Trend Micro cybersecurity experts Cyclops Blink'in birkaç model için tasarlanmış özel bir modülü vardır. of a new ransomware called DarkRadiation. The malware is designed to attack Red Hat/CentOS and Debian Linux distributions. To communicate with the C&C sunucusu, the attackers use the Telegram messenger.

The malware uses AES (Advanced Encryption Standard) symmetric block cipher algorithm with CBC mode to encrypt files in various directories. At the present time, there is no information about the methods used to spread the malware, and there is no evidence that ransomware was used in actual attacks.

The information was obtained as a result of analysis of a set of hacking tools hosted in the infrastructure of an unidentified attacker in the api_attack directory. The api_attack folder contained several versions of DarkRadiation and the SSH worm (downloader.sh) responsible for spreading the malware.

The ransomware is under active development, for the purpose of obfuscation it uses the open-source tool node-bash-obfuscate, which allows you to split the code into several fragments, then assign a variable name to each segment and replace the original script with references to variables.

Most of the tools have very low detection numbers in Virus Total. It seems that some of the scripts are still in the development phase.say the researchers.

DarkRadiation checks to see if it was started as root and uses elevated permissions to download and install the Wget, cURL and OpenSSL libraries. The software also periodically collects information about users logged into the Unix system using the “DSÖ” command every five seconds. The data is then transferred to a server controlled by the attacker using the Telegram API.

At the last stage of the attack, the malware creates a list of all available users on the compromised system, overwrites existing passwords with megapassword and deletes all shell users, before creating a new user ferrum and password MegPw0rD3 to continue the encryption process.

The ransomware can delete all users on an infected system (although in some variants it keeps the root user) and can create an account only for the attacker. As for file encryption, the ransomware uses OpenSSL’s AES algorithm to encrypt either the file with specific extensions or all files at the given directory.write Trend Micro researchers.

DarkRadiation also disables all running Docker containers on the infected system and generates a ransom note. Uzmanlara göre, the ransomware adds radioactive characters (.) as an extension to the encrypted file.

DarkRadiation contains the install_tools function to download and install the necessary utilities on the infected system if they are not already installed. The worm downloads and installs only the necessary packages for a Linux distribution based on CentOS or RHEL, since it only uses the Yellowdog Updater, Modified (YUM) package manager.

Şu gerçeği de konuştuğumu hatırlatmama izin verin. Garip kötü amaçlı yazılım, kurbanların korsan sitelerini ziyaret etmesini engelliyor.

Helga Smith

Bilgisayar bilimlerine her zaman ilgi duymuşumdur., özellikle veri güvenliği ve tema, günümüzde denilen "veri bilimi", ilk gençlik yıllarımdan beri. Baş Editör olarak Virüs Temizleme ekibine gelmeden önce, Birkaç şirkette siber güvenlik uzmanı olarak çalıştım, Amazon'un yüklenicilerinden biri dahil. Başka bir deneyim: Arden ve Reading üniversitelerinde öğretmenlik var.

Cevap bırakın

Bu site spam azaltmak için Akismet kullanır. Yorumunuz verileri işlenirken öğrenin.

Başa dön tuşu