די FBI לינגקט די Diavol ראַנסאָמוואַרע צו די מחברים פון די TrickBot מאַלוואַרע.

The FBI officially confirms that the Diavol ransomware (“devil” in Romanian) is associated with the TrickBot group, which is developing the banking Trojan of the same name.

Last year, Fortinet analysts wrote that the Diavol און Conti ransomware payloads deployed on various systems in early June 2021 were very similar, and they had a lot in common, from using asynchronous I / O operations during file encryption, to using almost identical command line parameters for the same functions (פֿאַר בייַשפּיל, creating logs, encrypting disks and network resources, scanning the network).

אָבער, the experts still failed to find a direct connection between the Diavol ransomware and the authors of TrickBot, besides, they found a number of important differences. פֿאַר בייַשפּיל, the Diavol sample they studied did not have built-in checks to prevent the payload from triggering on systems in Russia and the CIS countries. אויך, the malware did not steal data before encryption.

Later, IBM X-Force also examined the Diavol sample and reported that they had found a number of new pieces of evidence linking Diavol to the developers of TrickBot. Unlike the sample analysed by Fortinet, which was newer andfully functional”, IBM X-Force experts found an older variant of the malware that was used by attackers for testing.

In the end, IBM X-Force came to the same conclusions, noting that Diavol and TrickBot are clearly related.

As FBI officials have now reported, the specialists were completely right.

The FBI first became aware of the Diavol ransomware in October 2021. Diavol is associated with developers from the Trickbot group, who are responsible for the Trickbot banking trojan.law enforcement officers write.

The FBI also reports that Diavol operators typically demand a ransom of between $10,000 און $500,000, with smaller amounts usually accepted after negotiation with the perpetrators.

Vitaly Kremez
Vitaly Kremez

The FBI also encourages all victims, whether or not they plan to pay a ransom to the perpetrators, to notify law enforcement of attacks in a timely manner to collect fresh indicators of compromise.

די בליפּינג קאָמפּיוטער publication believes that the FBI was able to officially link Diavol with TrickBot after the arrest of Alla Witte, a Latvian who participated in the development of a cryptographer for a hack group. AdvIntel CEO Vitaly Kremez, who has been monitoring TrickBot’s operations for a long time, confirmed to reporters that Witte was responsible for developing the new TrickBot-related ransomware.

Alla Witte played a critical role in TrickBot’s operations and, based on previous in-depth analysis by AdvIntel, she was responsible for the development of the Diavol ransomware and the frontend/backend project designed to support TrickBot’s operations with a special ransomware. Another name for the Diavol ransomware is Enigma, which was used by the TrickBot team before rebranding to Diavol.Kremez said.

Let me remind you that they also reported that TrickBot got a new module for monitoring victims.

העלגאַ סמיט

איך בין שטענדיק אינטערעסירט אין קאָמפּיוטער וויסנשאַפֿט, ספּעציעל דאַטן זיכערהייט און די טעמע, וואס הייסט היינט-צו-טאג "דאַטן וויסנשאַפֿט", זינט מיין פרי טינז. איידער איר קומען אין די ווירוס באַזייַטיקונג מאַנשאַפֿט ווי רעדאַקטאָר-אין-ראשי, איך געארבעט ווי אַ סייבערסעקוריטי מומחה אין עטלעכע קאָמפּאַניעס, אַרייַנגערעכנט איינער פון אַמאַזאָן ס קאָנטראַקטאָרס. אן אנדער דערפאַרונג: איך האָבן געלערנט אין Arden און רידינג אוניווערסיטעטן.

לאָזן אַ ענטפער

דער פּלאַץ ניצט Akismet צו רעדוצירן ספּאַם. לערנען ווי דיין באַמערקונג דאַטן זענען פּראַסעסט.

צוריק צו שפּיץ קנעפּל