• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hello xd ransomware installing backdoor on targeted windows and linux

Hello XD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

You are here: Home / General Cyber Security News / Hello XD Ransomware Installing Backdoor on Targeted Windows and Linux Systems
June 13, 2022

Windows and Linux devices are currently being targeted by a ransomware variant named HelloXD, with the bacterial infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts.

“Contrary to other ransomware teams, this ransomware family members would not have an energetic leak site as an alternative it prefers to direct the impacted target to negotiations by way of Tox chat and onion-dependent messenger situations,” Daniel Bunce and Doel Santos, security scientists from Palo Alto Networks Unit 42, stated in a new produce-up.

HelloXD surfaced in the wild on November 30, 2021, and is based mostly off leaked code from Babuk, which was revealed on a Russian-language cybercrime forum in September 2021.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The ransomware family members is no exception to the norm in that the operators comply with the attempted-and-examined method of double extortion to need cryptocurrency payments by exfiltrating a victim’s sensitive details in addition to encrypting it and threatening to publicize the data.

The implant in dilemma, named MicroBackdoor, is an open-supply malware that’s used for command-and-handle (C2) communications, with its developer Dmytro Oleksiuk contacting it a “really minimalistic detail with all of the basic attributes in a lot less than 5,000 lines of code.”

Hello XD Ransomware

Notably, unique variants of the implant were adopted by the Belarusian risk actor dubbed Ghostwriter (aka UNC1151) in its cyber functions in opposition to Ukrainian point out corporations in March 2022.

MicroBackdoor’s options enable an attacker to search the file program, upload and obtain documents, execute instructions, and erase evidence of its presence from the compromise devices. It is really suspected that the deployment of the backdoor is carried out to “monitor the progress of the ransomware.”

Device 42 reported it joined the probably Russian developer powering HelloXD — who goes by the online aliases x4k, L4ckyguy, unKn0wn, unk0w, _unkn0wn, and x4kme — to further malicious functions this sort of as providing evidence-of-principle (PoC) exploits and customized Kali Linux distributions by piecing with each other the actor’s electronic trail.

“x4k has a incredibly stable online presence, which has enabled us to uncover a lot of his action in these last two many years,” the scientists claimed. “This threat actor has carried out little to cover destructive activity, and is likely likely to continue on this habits.”

CyberSecurity

The findings come as a new analyze from IBM X-Pressure revealed that the normal duration of an business ransomware attack — i.e., the time in between original obtain and ransomware deployment — lowered 94.34% in between 2019 and 2021 from over two months to a mere 3.85 times.

The elevated speed and performance traits in the ransomware-as-a-assistance (RaaS) ecosystem has been attributed to the pivotal purpose performed by preliminary entry brokers (IABs) in getting accessibility to target networks and then marketing the obtain to affiliate marketers, who, in flip, abuse the foothold to deploy ransomware payloads.

“Paying for accessibility may appreciably decrease the volume of time it requires ransomware operators to conduct an attack by enabling reconnaissance of programs and the identification of vital details earlier and with better relieve,” Intel 471 reported in a report highlighting the close doing the job interactions among IABs and ransomware crews.

“Also, as relationships improve, ransomware groups may well establish a sufferer who they want to target and the entry service provider could supply them the obtain the moment it is offered.”

Uncovered this short article intriguing? Stick to THN on Fb, Twitter  and LinkedIn to examine additional exceptional material we publish.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «how rural businesses can overcome their cyber security handicaps How rural businesses can overcome their cyber security handicaps
Next Post: Eight Zero Days Could Open Doors for Hackers Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.