Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

5/8/2019
08:10 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

'MegaCortex' Ransomware Hunts 'Big Game' Enterprise

They aren't looking for a lot of little hits. They want treasure.

Recently, ransomware aimed at individuals has receded from last year's high levels. But that doesn't mean that it has gone away.

The UK's Sophos Labs has found that a new strain of this malware, MegaCortex, has just popped up during late January in enterprise networks located in Italy, the US, Canada, the Netherlands, Ireland and France, with an attack campaign using a strategy of "big game hunting."

The major change in focus of the ransomware is that they eschew mass, spammy campaigns in favor of a targeted attack. They aren't looking for a lot of little hits. They want treasure. Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga and Matrix all use the same philosophy so it's a popular one.

This strain onboards in a way that is complicated and sophisticated.

Sophos explains it this way: the infection "leverages both automated and manual components, and appears to involve a high amount of automation to infect a greater number of victims. In attacks we've investigated, the attackers used a common red-team attack tool script to invoke a meterpreter reverse shell in the victim's environment. From the reverse shell, the infection chain uses PowerShell scripts, batch files from remote servers, and commands that only trigger the malware to drop encrypted secondary executable payloads (that had been embedded in the initial dropped malware) on specified machines."

But there are 76 confirmed attacks thus far since February, with 47 of those (or about two thirds of the known incidents) happening on Monday and Tuesday of this week. The complicated approach seems to work. Each attack targeted an enterprise network and may have involved hundreds of machines.

Brandon Levene, head of applied intelligence at Chronicle (VirusTotal's parent company) has his own ideas about the malware's origins. He told Security Now in a statement that, "While there are no earlier samples of MegaCortex available, the same signer certificate (CN) is used in both the Rietspoof loader and MegaCortex samples dating back to at least Jan. 22, 2019. This means it is highly likely that the people using Rietspoof with that signature are also using MegaCortex. I can't say definitively that the same threat actors are behind both Rietspoof and Megacortex, but this finding solidifies a correlation."

Sophos also doesn't have all the paths of the situation neatly tied into bows either. They admit that, "Right now, we can't say for certain whether the MegaCortex attacks are being aided and abetted by the Emotet malware, but so far in our investigation (which is still ongoing as this post goes live), there seems to be a correlation between the MegaCortex attacks and the presence on the same network of both Emotet and Qbot (aka Qakbot) malware."

But both of those can download/drop other malware.

Surprisingly, the attack that Sophos has details on was initiated from a compromised domain controller, not from the Internet. This may have resulted from a straightforward hijacking or credential stuffing that the attackers undertook to gain access to the device. But what ransom is sought after all this fuss? It depends, it seems. The ransom note is non-specific, trying rather to set up an introductory appointment so they can pitch you their skillzz. And they will pinky-swear that they won't do nasty stuff like this again to you. Really.

I wonder who got the idea that malware could be a vCard at the same time?

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41679
PUBLISHED: 2021-11-30
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter.
CVE-2021-25987
PUBLISHED: 2021-11-30
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body� and “tags� don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary...
CVE-2021-41678
PUBLISHED: 2021-11-30
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff{TITLE] parameter.
CVE-2021-41677
PUBLISHED: 2021-11-30
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter.
CVE-2021-42122
PUBLISHED: 2021-11-30
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on an object’s attributes with numeric...