Zscaler discovers new RedEnergy Stealer-as-a-Ransomware campaign

Share:

The Zscaler ThreatLabz security team has issued a warning about a new malware variant called RedEnergy Stealer, which has been categorized as a hybrid Stealer-as-a-Ransomware (SaaR) threat. This new malware category combines data theft with encryption, allowing it to inflict maximum damage on the victim. The new stealer uses a fake browser update campaign to target vertical industries such as utilities, oil and gas, and telecommunications providers. The malware has the ability to steal information from different browsers and is therefore able to extract sensitive data. Additionally, the stealer includes various modules for performing ransomware activities. Attacked companies face the loss of sensitive data,

The stealer variant studied by ThreatLabZ analysts uses a deceptive Fake Updates campaign to trick people in targeted companies into updating their browsers. The redirection technique is used for this. When trying to access a company website via their LinkedIn profile, unsuspecting users are redirected to a website with malicious code. There they are prompted to install an apparently legitimate browser update using four different browser icons. Instead of a real update, however, the RedEnergy Stealer executable file is loaded onto your system.

zscaler redenergy saar infektionskette

The malware works in several stages and starts executing malicious files disguised as browser update hiding behind various popular browsers like Google Chrome, Microsoft Edge, Firefox or Opera. The attack is carried out superficially hidden behind a real certificate to inspire trust in the user. In the second phase, data is reloaded and persistence in the system is ensured. The malware installs four files on the victim’s system, two of which are executable and follow the same naming principle. Only one of the files carries the actual payload, which is loaded in the background while the other files mimic the browser update process. To ensure the desired persistence in the system, malicious,

Suspicious FTP interactions indicate possible data exfiltration and unauthorized file uploads. The malware contains ransomware modules that steal user data with the “.FACKOFF!” extension. encrypt them so that they are no longer accessible until a ransom is paid. It also modifies the desktop.ini file to bypass detection and change file system folder display settings. In the final phase, the malware deletes shadow drive data and Windows backup plans, thereby reinforcing ransomware characteristics. RedEnergy Stealer drops a batch file and ransom note on affected systems, demanding payment for decrypting the files.

Conclusion

The technical analysis of the malware has revealed its dual functionality as a stealer and ransomware and represents an alarming development compared to conventional attacks. The attack campaigns analyzed show the further development of attack methods and a specialization in different industries and organizations. These novel Stealer as a Ransomware campaigns underline the importance of robust security measures and the need to raise user awareness of novel attack patterns.

 

(c) Herbert Wieler

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

loader-image
Austria, AT
8:10 pm, Dez. 27, 2024
weather icon 1°C
L: 1° H: 1°
scattered clouds
Humidity 80 %
Pressure 1035 mb
Wind 7 mph SSE
Wind Gust Wind Gust: 5 mph
UV Index UV Index: 0
Precipitation Precipitation: 0 mm
Clouds Clouds: 45%
Rain Chance Rain Chance: 0%
Visibility Visibility: 10 km
Sunrise Sunrise: 7:53 am
Sunset Sunset: 4:22 pm
DailyHourly
Daily ForecastHourly Forecast
Nach oben scrollen