• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rust written 3am ransomware: a sneak peek into a new malware

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family

You are here: Home / General Cyber Security News / Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family
September 13, 2023

A new ransomware spouse and children identified as 3AM has emerged in the wild just after it was detected in a solitary incident in which an unknown affiliate deployed the strain next an unsuccessful try to deploy LockBit (aka Bitwise Spider or Syrphid) in the goal network.

“3AM is prepared in Rust and seems to be a entirely new malware family,” the Symantec Risk Hunter Group, element of Broadcom, explained in a report shared with The Hacker News.

“The ransomware tries to stop multiple solutions on the infected personal computer before it starts encrypting documents. After encryption is full, it makes an attempt to delete Volume Shadow (VSS) copies.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

3AM gets its title from the truth that it is really referenced in the ransom notice. It also appends encrypted information with the extension .threeamtime. That reported, it truly is at present not recognised if the malware authors have any connections with acknowledged e-crime groups.

In the attack noticed by Symantec, the adversary is stated to have managed to deploy the ransomware to 3 machines on the organization’s network, only for it to be blocked on two of those devices.

The intrusion is noteworthy for using Cobalt Strike for submit-exploitation and privilege escalation, following it up by managing reconnaissance instructions to detect other servers for lateral movement. The correct ingress route utilized in the attack is unclear.

“They also extra a new person for persistence and made use of the Wput tool to exfiltrate the victims’ documents to their individual FTP server,” Symantec observed.

A 64-bit executable prepared in Rust, 3AM is engineered to operate a series of commands to halt a variety of security and backup-related software program, encrypt documents matching predefined requirements, and purge volume shadow copies.

Forthcoming WEBINARWay Also Susceptible: Uncovering the Condition of the Id Attack Floor

Reached MFA? PAM? Service account protection? Find out how well-geared up your organization actually is against id threats

Supercharge Your Skills

Though the actual origins of the ransomware remains not known, there is proof that the ransomware affiliate linked to the operation is targeting other entities, according to a submit shared on Reddit on September 9, 2023.

“Ransomware affiliates have become ever more impartial from ransomware operators,” Symantec mentioned.

“New ransomware people surface routinely and most vanish just as speedily or never manage to attain substantial traction. Nevertheless, the actuality that 3AM was applied as a fallback by a LockBit affiliate suggests that it may well be of fascination to attackers and could be observed again in the foreseeable future.”

Found this write-up attention-grabbing? Follow us on Twitter  and LinkedIn to read through much more exceptional content material we put up.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «microsoft warns of new phishing campaign targeting corporations via teams Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages
Next Post: Webinar: Identity Threat Detection & Response (ITDR) – Rips in Your Identity Fabric webinar: identity threat detection & response (itdr) – rips in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.