Press ESC to close

Embargo Ransomware: Rock’n’Rust

CategoryDetails
Threat ActorsEmbargo ransomware group (Rust-based ransomware).
Campaign OverviewActive since June 2024; targets US companies; uses MDeployer loader and MS4Killer EDR killer; evolving tooling with active development.
Target Regions (Victims)US companies (July 2024 incidents observed).
MethodologyUses Safe Mode to disable security solutions; tailored tools for each victim; deploys MS4Killer (EDR killer) and Embargo ransomware via MDeployer loader.
Product TargetedWindows operating systems (via MDeployer and MS4Killer).
Malware ReferenceEmbargo ransomware, MDeployer (loader), MS4Killer (EDR killer).
Tools UsedRust-based tools, MDeployer (for decryption and execution), MS4Killer (EDR killer), praxisbackup.exe, pay.exe.
Vulnerabilities ExploitedExploits vulnerable drivers for MS4Killer to disable security solutions.
TTPs– Safe Mode usage
– Custom compilation of MS4Killer for victim’s environment
– Double extortion (data leakage)
– Use of encrypted files (RC4) for payloads
AttributionEmbargo, possibly RaaS provider; sophisticated and well-resourced group.
Recommendations– Patch vulnerabilities affecting drivers
– Enhance endpoint security to detect and block Rust-based ransomware and EDR killers
SourceWeliveSecurity

Read full article: https://www.welivesecurity.com/en/eset-research/embargo-ransomware-rocknrust/

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *