• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rust written 3am ransomware: a sneak peek into a new malware

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family

You are here: Home / General Cyber Security News / Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family
September 13, 2023

A new ransomware spouse and children identified as 3AM has emerged in the wild just after it was detected in a solitary incident in which an unknown affiliate deployed the strain next an unsuccessful try to deploy LockBit (aka Bitwise Spider or Syrphid) in the goal network.

“3AM is prepared in Rust and seems to be a entirely new malware family,” the Symantec Risk Hunter Group, element of Broadcom, explained in a report shared with The Hacker News.

“The ransomware tries to stop multiple solutions on the infected personal computer before it starts encrypting documents. After encryption is full, it makes an attempt to delete Volume Shadow (VSS) copies.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

3AM gets its title from the truth that it is really referenced in the ransom notice. It also appends encrypted information with the extension .threeamtime. That reported, it truly is at present not recognised if the malware authors have any connections with acknowledged e-crime groups.

In the attack noticed by Symantec, the adversary is stated to have managed to deploy the ransomware to 3 machines on the organization’s network, only for it to be blocked on two of those devices.

The intrusion is noteworthy for using Cobalt Strike for submit-exploitation and privilege escalation, following it up by managing reconnaissance instructions to detect other servers for lateral movement. The correct ingress route utilized in the attack is unclear.

“They also extra a new person for persistence and made use of the Wput tool to exfiltrate the victims’ documents to their individual FTP server,” Symantec observed.

A 64-bit executable prepared in Rust, 3AM is engineered to operate a series of commands to halt a variety of security and backup-related software program, encrypt documents matching predefined requirements, and purge volume shadow copies.

Forthcoming WEBINARWay Also Susceptible: Uncovering the Condition of the Id Attack Floor

Reached MFA? PAM? Service account protection? Find out how well-geared up your organization actually is against id threats

Supercharge Your Skills

Though the actual origins of the ransomware remains not known, there is proof that the ransomware affiliate linked to the operation is targeting other entities, according to a submit shared on Reddit on September 9, 2023.

“Ransomware affiliates have become ever more impartial from ransomware operators,” Symantec mentioned.

“New ransomware people surface routinely and most vanish just as speedily or never manage to attain substantial traction. Nevertheless, the actuality that 3AM was applied as a fallback by a LockBit affiliate suggests that it may well be of fascination to attackers and could be observed again in the foreseeable future.”

Found this write-up attention-grabbing? Follow us on Twitter  and LinkedIn to read through much more exceptional content material we put up.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «microsoft warns of new phishing campaign targeting corporations via teams Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages
Next Post: Webinar: Identity Threat Detection & Response (ITDR) – Rips in Your Identity Fabric webinar: identity threat detection & response (itdr) – rips in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.