Attribute | Details |
---|---|
Threat Actors | Ymir ransomware group; RustyStealer malware as initial infection vector. |
Campaign Overview | Global ransomware campaign targeting organizations with advanced in-memory execution techniques. |
Target Regions | Colombia, Pakistan, Australia, Ukraine; possible ties to Central African countries through Lingala code comments. |
Methodology | Initial access via RustyStealer; in-memory execution; ChaCha20 encryption; persistence via scheduled tasks/system service. |
Product Targeted | Business-critical files; operational and sensitive data. |
Malware Reference | Ymir ransomware, RustyStealer. |
Tools Used | ChaCha20 encryption algorithm, memory manipulation functions (e.g., malloc, memmove), and scheduled tasks. |
Vulnerabilities Exploited | Uses stolen credentials from RustyStealer infections; relies on poor access controls and unpatched systems. |
TTPs | – File and Directory Discovery (T1083) – System Information Discovery (T1082) – Data Encryption for Impact (T1486) – Virtualization/Sandbox Evasion (T1497.003). |
Attribution | Kaspersky researchers; potential ties to Central Africa suggested by code language. |
Recommendations | – Multi-layered security: MFA, EDR, PoLP, and patch management – Isolated backups – Dark Web and network monitoring. |
Source | SOCRadar |
Read full article: https://socradar.io/dark-web-profile-ymir-ransomware/
Disclaimer: The above summary has been generated by an AI language model
Leave a Reply