Press ESC to close

Ymir: New Stealthy Ransomware in the Wild

Category Details
Threat Actors Unknown, but associated with access brokers and ransomware groups.
Campaign Overview Ymir ransomware deployed via PowerShell commands after initial access via RustyStealer.
Target Regions (Or Victims) Organizations worldwide, specific incident in Colombia.
Methodology Initial access via RustyStealer, followed by Ymir ransomware deployment using PowerShell.
Product Targeted Windows systems, specifically targeting files and encrypting them.
Malware Reference Ymir ransomware, Trojan-Ransom.Win64.Ymir.gen.
Tools Used PowerShell, Process Hacker, Advanced IP Scanner, qTox client (for C2 communication).
Vulnerabilities Exploited Compromised credentials, PowerShell remote control.
TTPs – Initial access with stealer malware
– Persistence via PowerShell
– File encryption with ChaCha20 algorithm
Attribution Not attributed to a specific group yet, suspected VPN/Tor usage.
Recommendations – Improve monitoring and response strategies
– Enhance detection and response beyond EPP.
Source Securelist by Kaspersky

Read full article: Read More

Disclaimer: The above summary has been generated by an AI language model.

Source: Securelist

Published on: November 11, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *