• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
is this the end of the road for ransomware?

Microsoft identifies sophisticated Hive ransomware variant written in Rust

You are here: Home / General Cyber Security News / Microsoft identifies sophisticated Hive ransomware variant written in Rust
July 6, 2022

Shutterstock

The threat actors driving Hive ransomware have designed major adjustments to the payload in a new variant uncovered by Microsoft Menace Intelligence Centre (MSTIC).

Most noteworthy amid the updates is the migration of the ransomware’s code to a new language, and the work of a much more innovative encryption technique.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


These adjustments provide the ransomware with improved handle above minimal-stage means, a much more consumer-pleasant syntax for threat actors and a structure extra conducive to economical encryption.

The new encryption system suggests sure countermeasures against Hive have turn into much less productive. Instead of embedding an encrypted crucial in every single file that the payload influences, the new variant employs a novel strategy of encryption that is much harder to remedy.

MSTIC describes that it “generates two sets of keys in memory, takes advantage of them to encrypt data files, and then encrypts and writes the sets to the root of the travel it encrypts, the two with .crucial extension.”

MSTIC also warns that the new variant does not have the ‘help’ menu available for attackers in previous variations, which indicates that although attackers will have to now memorise parameters them selves, it also tends to make the undertaking of getting parameters more difficult for security researchers.

Hive ransomware was first learned in June 2021, and considering that has been applied for various attacks such as that suffered not long ago by the Costa Rican health care services. Like other ransomware, at the time deployed its payload functions to disable process processes and services that may incorporate it or enable the sufferer to prevent it from encrypting key documents. 

It also deletes backups to protect against the sufferer from securely recovering their files, and then generates a ransom note in basic textual content structure. MSTIC credits it with big-scale attacks in the computer software and healthcare sectors.

An additional piece of ransomware coded in Rust, known as BlackCat, was flagged by the FBI before this yr as owning breached around 60 organisations around the globe.

Ransomware-as-a-support (RaaS) versions, in which risk actors lease ransomware application from destructive builders relatively than building and deploying their possess computer software, are increasingly well-liked and threatening to businesses.

In the Sophos 2022 Risk Report, the security business asserts that going forward, “the RaaS company product will continue on to dominate the risk landscape for ransomware attacks, as this product permits industry experts in ransomware design to continue to build and enhance their product whilst offering gurus in “initial access” break-ins the means to focus on this endeavor with raising intensity.”


Some sections of this short article are sourced from:
www.itpro.co.uk

Previous Post: «southwest health center hit by data breach Southwest Health Center hit by data breach
Next Post: Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.