MegaCortex Ransomware Hunts Big Game Enterprise

  /     /     /  
Publicated : 23/11/2024   Category : security


MegaCortex Ransomware Hunts Big Game Enterprise


They arent looking for a lot of little hits. They want treasure.



Recently, ransomware aimed at individuals has receded from last years high levels. But that doesnt mean that it has gone away.
The UKs Sophos Labs
has found
that a new strain of this malware, MegaCortex, has just popped up during late January in enterprise networks located in Italy, the US, Canada, the Netherlands, Ireland and France, with an attack campaign using a strategy of
big game hunting
.
The major change in focus of the ransomware is that they eschew mass, spammy campaigns in favor of a targeted attack. They arent looking for a lot of little hits. They want treasure. Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga and Matrix all use the same philosophy so its a popular one.
This strain onboards in a way that is complicated and sophisticated.
Sophos explains it this way: the infection leverages both automated and manual components, and appears to involve a high amount of automation to infect a greater number of victims. In attacks weve investigated, the attackers used a common red-team attack tool script to invoke a meterpreter reverse shell in the victims environment. From the reverse shell, the infection chain uses PowerShell scripts, batch files from remote servers, and commands that only trigger the malware to drop encrypted secondary executable payloads (that had been embedded in the initial dropped malware) on specified machines.
But there are 76 confirmed attacks thus far since February, with 47 of those (or about two thirds of the known incidents) happening on Monday and Tuesday of this week. The complicated approach seems to work. Each attack targeted an enterprise network and may have involved hundreds of machines.
Brandon Levene, head of applied intelligence at Chronicle (VirusTotals parent company) has his own ideas about the malwares origins. He told Security Now in a statement that, While there are no earlier samples of MegaCortex available, the same signer certificate (CN) is used in both the Rietspoof loader and MegaCortex samples dating back to at least Jan. 22, 2019. This means it is highly likely that the people using Rietspoof with that signature are also using MegaCortex. I cant say definitively that the same threat actors are behind both Rietspoof and Megacortex, but this finding solidifies a correlation.
Sophos also doesnt have all the paths of the situation neatly tied into bows either. They admit that, Right now, we cant say for certain whether the MegaCortex attacks are being aided and abetted by the Emotet malware, but so far in our investigation (which is still ongoing as this post goes live), there seems to be a correlation between the MegaCortex attacks and the presence on the same network of both Emotet and Qbot (aka Qakbot) malware.
But both of those can download/drop other malware.
Surprisingly, the attack that Sophos has details on was initiated from a compromised domain controller, not from the Internet. This may have resulted from a straightforward hijacking or credential stuffing that the attackers undertook to gain access to the device. But what ransom is sought after all this fuss? It depends, it seems. The ransom note is non-specific, trying rather to set up an introductory appointment so they can pitch you their skillzz. And they will pinky-swear that they wont do nasty stuff like this again to you. Really.
I wonder who got the idea that malware could be a vCard at the same time?
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
MegaCortex Ransomware Hunts Big Game Enterprise