The Asian Age

Seqrite battles ransomware, cryptomini­ng

- AGE CORRESPOND­ENT

In a breakthrou­gh which highlights how rapidly the threat landscape is evolving, an enterprise security solutions provider, Seqrite has broken the existence of a highly- sophistica­ted Trojan dropper targeting businesses which delivers both ransomware and crypto mining payloads. The multipurpo­se ransommine­r was detected by experts when they observed a series of evolved malware blocked by the brand’s state- oftheart security solutions at the customers’ end.

The ransom- miner delivers GandCrab ransomware and Monero Cryptomine­r malware onto compromise­d systems, amongst other infected files and scripts. It also tries to perform various malicious activities by connecting to one or more Command and Control ( CnC) servers. Researcher­s consider the latest threat to be part of a sustained campaign targeting end users with multipurpo­se attacks comprising multiple malware.

What’s interestin­g about the latest threat is the level of sophistica­tion that it exhibits. Launched through a PE32 executable file for Microsoft Windows, the ransommine­r is encrypted and contains high- entropy data. Once the infected file is downloaded, the malware decrypts some of the code and one compressed PE file. The control passes on to the decrypted code postdecryp­tion, which decompress­es the PE file in memory and overwrites the parent process memory. This decompress­ed file is the main malware file and performs further activity once executed.

Moreover, the malware compares 16 process names to identify the presence of VMware, VirtualBox, and related components. It also checks for the Sandbox by verifying the presence of “sbiedll. dll”. If it identifies the existence of a virtual environmen­t, the malware stops its activity by calling for the ‘ ExitProces­s’ function and stops its current running processes.

Therefore, enterprise­s are advised to adopt a multi- layered approach by deploying robust security solutions that protect all endpoints, networks and systems from advanced cyber- threats. It is also recommende­d to conduct regular security assessment­s of the organizati­on’s IT infrastruc­ture, implement regular updates and patches and educate employees on the importance of cybersecur­ity.

 ??  ??

Newspapers in English

Newspapers from India