article thumbnail

Expert warns of Turtle macOS ransomware

Security Affairs

The popular cyber security researcher Patrick Wardle published a detailed analysis of the new macOS ransomware Turtle. The Turtle ransomware reads files into memory, encrypt them with AES (in CTR mode), rename the files, then overwrites the original contents of the files with the encrypted data. concludes the analysis.

article thumbnail

Snake Ransomware isolates infected Systems before encrypting files

Security Affairs

Experts spotted recent samples of the Snake ransomware that were isolating the infected systems while encrypting files to avoid interference. The Snake ransomware kills processes from a predefined list, including ICS-related processes, to encrypt associated files. ” continues the analysis. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

StrelaStealer targeted over 100 organizations across the EU and US

Security Affairs

Upon downloading and opening the archive, a JScript file is dropped onto the system. “The JScript file then drops a Base64-encrypted file and a batch file. The Base64-encrypted file is decoded with the certutil -f decode command, resulting in the creation of a Portable Executable (PE) DLL file.”

article thumbnail

Bronze Starlight targets the Southeast Asian gambling sector

Security Affairs

Then the loaders retrieve a second-stage payload stored in password-protected ZIP archive from Alibaba buckets. “The zip archives downloaded by agentupdate_plugins.exe and AdventureQuest.exe contain sideloading capabilities. ” reads the analysis published by SentinelOne. IP-based geolocation service.

article thumbnail

Spotting RATs: Delphi wrapper makes the analysis harder

Security Affairs

Experts observed an increase of the malware spreading using less-known archive types as dropper,in particular ISO image.Delphi wrapper makes analysis harder. In the last period, we observed an increase of the malware spreading using less-known archive types as an initial dropper, in particular, ISO image. Technical Analysis.

article thumbnail

Numando, a new banking Trojan that abuses YouTube for remote configuration

Security Affairs

. “Some Numando variants store these images in an encrypted ZIP archive inside their.rsrc sections, while others utilize a separate Delphi DLL just for this storage. ” reads the analysis published by ESET. Decrypting the string results in a different URL that leads to the actual payload archive.

Archiving 102
article thumbnail

Hades ransomware gang targets big organizations in the US

Security Affairs

Accenture security researchers published an analysis of the latest Hades campaign, which is ongoing since at least December 2020. . Then the malware perform a scan in local directories and network shares for content to encrypt. ” reads the analysis published by Accenture. ” concludes the report.