Researchers have been analyzing a new ransomware family that calls itself "Egregor." Attackers behind the malware, which has affected at least 13 companies, typically operate by breaking into organizations, stealing sensitive data, and running the malware to encrypt their files.
Appgate researchers tracking the threat say it contains anti-analysis techniques such as code obfuscation and packed payloads. In one of its execution stages, they found, the payload can only be decrypted if the proper key is entered in the process's command line. This means the file can't be analyzed unless someone enters the same command line used to run the payload.
Egregor's ransom note promises that if the ransom is not paid within three days, the attackers will leak part of the stolen data and alert the victim company's partners and clients via mass media so they know of the breach.
If ransom is paid, Egregor's operators claim they will decrypt the files and provide recommendations for securing the company's network to avoid future attacks, "acting as some sort of black hat pentest team," the researchers write.
Read more details in Appgate's full blog post.Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio