A new ransomware, VHD, was found currently being shipped by the nation-point out group’s multiplatform malware system, MATA.
Targeted ransomware assaults are on the increase, normally perpetrated by monetarily enthusiastic danger gangs, which normally get the job done in concert with each other. However, researchers said that a the latest pressure of ransomware, identified as VHD, can be connected to an abnormal resource: The Lazarus Team APT.
In accordance to researchers from Kaspersky, the VHD ransomware has only been deployed in a handful of occasions, with a confined amount of samples demonstrating up in the firm’s telemetry. There are also handful of general public references.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
This “doesn’t in good shape the common modus operandi of acknowledged large-recreation hunting groups,” the scientists stated, in a blog site post issued on Tuesday. “This indicated that this ransomware family members could possibly not be traded widely on dark current market boards, as would normally be the situation.” They extra, “The knowledge we have at our disposal tends to reveal that the VHD ransomware is not a professional off-the-shelf product or service.”
Yet another sign that VHD is diverse was obvious from the begin: An first VHD incident in Europe associated a worm-like propagation technique reminiscent of APT teams.
“A spreading utility…contained a list of administrative qualifications and IP addresses certain to the target, and leveraged them to brute-pressure the SMB provider on every discovered equipment,” according to the put up. “Whenever a thriving relationship was manufactured, a network share was mounted, and the VHD ransomware was copied and executed by WMI phone calls. This stood out to us as an uncharacteristic method for cybercrime groups instead, it reminded us of the APT strategies Sony SPE, Shamoon and OlympicDestroyer, a few earlier wipers with worming capabilities.”
All of this is a deviation from the recognized ransomware ecosystem, according to Kaspersky.
“Criminals [usually] piggyback on common botnet infections (for instance, the notorious Emotet and Trickbot malware families) to spread into the network of promising victims, and license ransomware ‘products’from 3rd-party builders,” the researchers defined. “When the attackers have a very good knowledge of the target’s funds and IT processes, they deploy the ransomware on all the company’s assets and enter the negotiation stage.”
The VHD ransomware is penned in C++ and encrypts data files on all connected disks, the analysis decided. It also deletes any folder named “System Volume Information” (which are linked to Windows’ restore stage attribute). All of this is reasonably non-descript, but VHD has two other facets value noting, Kaspersky researchers explained.
“The system also stops procedures that could be locking important files, these types of as Microsoft Exchange and SQL Server. Files are encrypted with a mixture of AES-256 in ECB manner and RSA-2048,” researchers discussed. “The ransomware utilizes Mersenne Tornado as a supply of randomness, but regretably for the victims the RNG is reseeded each individual time new data is eaten. Nevertheless, this is unorthodox cryptography, as is the final decision to use the ‘electronic codebook’ (ECB) method for the AES algorithm.”
VHD also implements a mechanism to resume operations if the encryption course of action is interrupted. For information more substantial than 16MB, the ransomware shops the latest cryptographic components on the tricky generate, in obvious text. Kaspersky pointed out that this info is not deleted securely later on, which implies there might be a chance to recuperate some of the data files.
A second VHD situation arrived to mild two months later on, where by Kaspersky was equipped to study extra about VHD: Especially, regarding its infection chain. The assault expended 10 several hours in the an infection phase, and Kaspersky was equipped to establish that original access was reached by exploiting a vulnerable VPN gateway.
“After that, the attackers obtained administrative privileges, deployed a backdoor on the compromised system and ended up in a position to consider in excess of the Active Listing server,” the researchers mentioned. “They then deployed the VHD ransomware to all the devices in the network. In this instance, there was no spreading utility, but the ransomware was staged as a result of a downloader created in Python that we still believe that to be in enhancement.”
Crucially for attribution on the other hand, Kaspersky researchers were being able to observe a backdoor used for the duration of the incident that turned out to be a model of a multipurpose malware framework referred to as MATA, which targets Windows, Linux and macOS working units.
Kaspersky researchers just lately uncovered MATA (a.k.a. Dacls) remaining utilised in a series of attacks involving the infiltration of corporate entities around the earth in a quest to steal customer databases and distribute ransomware. The framework is made up of several elements, this sort of as a loader, an orchestrator (which manages and coordinates the processes the moment a unit is contaminated) and plugins. And in accordance to artifacts in the code, Lazarus has been using it because spring 2018.
“The forensics evidence gathered in the course of the incident response method is potent adequate that we feel comfy stating with a large diploma of confidence that there was only a single danger actor in the victim’s network during the time of the [second VHD] incident,” in accordance to the publish. The researchers included, “and as much as we know, the Lazarus group is the sole owner of the MATA framework. For this reason, we conclude that the VHD ransomware is also owned and operated by Lazarus.”
Interestingly, the researchers hypothesize that Lazarus is building a huge alter from its previous method to cybercrime by mounting this kind of an attack. North Korea-joined Lazarus, a.k.a. Concealed Cobra or APT 38, has been around because 2009. The APT has been connected to the hugely harmful WannaCry attack that induced thousands and thousands of pounds of economic hurt in 2017, the SWIFT banking assaults, as perfectly as the large-profile assault against Sony Images Amusement in 2014. Its motivations range from assertion-generating to espionage to money.
“Lazarus has generally existed at a particular crossroads between APT and economic crime, and there have lengthy been rumors in the danger intelligence local community that the team was a customer of many botnet products and services,” they said. “We can only speculate about the purpose why they are now jogging solo ops: it’s possible they obtain it challenging to interact with the cybercrime underworld, or perhaps they felt they could no for a longer time find the money for to share their revenue with third parties….Only time will explain to whether they soar into looking major sport comprehensive time, or scrap it as a unsuccessful experiment.”
Complimentary Threatpost Webinar: Want to discover much more about Confidential Computing and how it can supercharge your cloud security? This webinar “Cloud Security Audit: A Private Computing Roundtable” provides best cloud-security specialists together to investigate how Confidential Computing is a match changer for securing dynamic cloud data and avoiding IP exposure. Join us Wednesday Aug. 12 at 2pm ET for this FREE live webinar.