Press ESC to close

Dark Web Profile: Ymir Ransomware

AttributeDetails
Threat ActorsYmir ransomware group; RustyStealer malware as initial infection vector.
Campaign OverviewGlobal ransomware campaign targeting organizations with advanced in-memory execution techniques.
Target RegionsColombia, Pakistan, Australia, Ukraine; possible ties to Central African countries through Lingala code comments.
MethodologyInitial access via RustyStealer; in-memory execution; ChaCha20 encryption; persistence via scheduled tasks/system service.
Product TargetedBusiness-critical files; operational and sensitive data.
Malware ReferenceYmir ransomware, RustyStealer.
Tools UsedChaCha20 encryption algorithm, memory manipulation functions (e.g., malloc, memmove), and scheduled tasks.
Vulnerabilities ExploitedUses stolen credentials from RustyStealer infections; relies on poor access controls and unpatched systems.
TTPs– File and Directory Discovery (T1083)
– System Information Discovery (T1082)
– Data Encryption for Impact (T1486)
– Virtualization/Sandbox Evasion (T1497.003).
AttributionKaspersky researchers; potential ties to Central Africa suggested by code language.
Recommendations– Multi-layered security: MFA, EDR, PoLP, and patch management
– Isolated backups
– Dark Web and network monitoring.
Source SOCRadar

Read full article: https://socradar.io/dark-web-profile-ymir-ransomware/

Disclaimer: The above summary has been generated by an AI language model

Source: SOCRadar

Published on: December 9, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *