• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers link cheerscrypt linux based ransomware to chinese hackers

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

You are here: Home / General Cyber Security News / Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers
October 3, 2022

The lately identified Linux-Based mostly ransomware strain known as Cheerscrypt has been attributed to a Chinese cyber espionage group recognised for functioning brief-lived ransomware schemes.

Cybersecurity organization Sygnia attributed the attacks to a danger actor it tracks beneath the title Emperor Dragonfly, which is also identified as Bronze Starlight (Secureworks) and DEV-0401 (Microsoft).

“Emperor Dragonfly deployed open up supply resources that had been written by Chinese developers for Chinese end users,” the enterprise mentioned in a report shared with The Hacker Information. “This reinforces promises that the ‘Emperor Dragonfly’ ransomware operators are dependent in China.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The use of Cheerscrypt is the latest addition to a very long checklist of ransomware households beforehand deployed by the team in minimal over a calendar year, which includes LockFile, Atom Silo, Rook, Evening Sky, Pandora, and LockBit 2..

Secureworks, in its profile of the group, mentioned “it is plausible that Bronze Starlight deploys ransomware as a smokescreen fairly than for money get, with the fundamental drive of thieving mental home theft or conducting espionage.”

Cheerscrypt was very first documented by Craze Micro in Could 2022, contacting out its qualities to target VMware ESXi servers as portion of a attempted-and-tested tactic known as double extortion to coerce its victims into having to pay the ransom or risk struggling with knowledge publicity.

It has also claimed to be pro-Ukrainian, displaying a “Glory to Ukraine!” concept on their dark web details leak web-site.

Curiously, the ransomware shares overlaps with the Linux version of the Babuk ransomware, which had its supply code leaked in September 2021 and also sorts the basis of Emperor Dragonfly’s Rook, Night Sky, and Pandora family members.

The threat actor’s modus operandi further more stands out for its managing of all stages of the ransomware attack lifecycle, appropriate from first entry to ransomware deployment, with out relying on affiliates and access brokers. Microsoft known as it a “lone wolf.”

CyberSecurity

Infection chains noticed to date have produced use of the critical Log4Shell vulnerability in Apache Log4j library to compromise VMware Horizon servers to fall a PowerShell payload capable of providing an encrypted Cobalt Strike beacon.

Sygnia claimed that it also uncovered a few extra Go-centered tools deployed in tandem to the beacon: a keylogger that exports the recorded keystrokes to Alibaba Cloud, an internet proxy utility referred to as iox, and a tunneling program regarded as NPS.

Cheerscrypt’s hyperlinks to Emperor Dragonfly similarities in initial access vectors, lateral movement methods, and the deployment of the encrypted Cobalt Strike beacon by way of DLL side-loading.

“Emperor Dragonfly is a China-based ransomware operator, generating it a rarity in today’s danger landscape,” researchers stated, including “a one risk actor executed the whole operation.”

Observed this report interesting? Comply with THN on Facebook, Twitter  and LinkedIn to study more unique material we post.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «'systemic id problems for 10 million australians’ after optus breach, ‘Systemic ID problems for 10 million Australians’ after Optus breach, warns minister
Next Post: Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain Attack comm100 chat provider hijacked to spread malware in supply chain»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.