Vice Society Ransomware Attackers Adopt Robust Encryption Methods

December 23, 2022Rabbi LakshmananRansomware/Endpoint Security

Vice Association Ransomware

Vice Society ransomware attackers have switched to yet another custom ransomware payload in recent attacks targeting different sectors.

“This ransomware variantPolyviceuses the NTRUEncrypt and ChaCha20-Poly1305 algorithms to implement a robust encryption scheme,” said SentinelOne researcher Antonio Cocomazzi in his analysis.

The Vice Society, tracked by Microsoft under the name DEV-0832, is an intrusion, data breach, and extortion hacking group that first appeared in the threat landscape in May 2021.

Unlike other ransomware gangs, cybercriminals do not use in-house developed file-encrypting malware. Instead, third parties such as Hello Kitty, Zeppelin, and RedAlert ransomware have been known to deploy his lockers in their attacks.

According to SentinelOne, the threat actors behind the custom-branded ransomware are also selling similar payloads to other hacking teams based on PolyVice’s extensive similarities to ransomware stocks Chily and SunnyDay. indicates that there is

This means a “Locker-as-a-Service” offered in the form of a builder by an unknown threat actor whose purchaser can specify the encrypted file extension, ransom note filename, ransom note You can customize the payload, including its content. Above all, wallpaper text.

The move away from Zeppelin may have been spurred by the discovery in February 2020 of a weakness in the encryption algorithm that allowed researchers at cybersecurity firm Unit221B to devise a decryption.

Besides implementing a hybrid encryption scheme that combines asymmetric and symmetric encryption to securely encrypt files, PolyVice utilizes partial encryption and multi-threading to speed up the process.

As Cybereason revealed last week, it’s worth pointing out that the recently discovered Royal ransomware employs similar tactics to evade anti-malware defenses.

royal ransomware

Royal has its roots in the now-defunct Conti ransomware operation and also uses callback phishing (or call-based attack delivery) to trick victims into installing remote desktop software for initial access. Confirmed.

Leaked Conti Source Code Facilitates New Ransomware Variant

Conti ransomware source code

Meanwhile, the leak of Conti’s source code earlier this year has spawned many new ransomware variants such as Putin Team, ScareCrow, BlueSky, and Meow. Faction with minimal investment.

“The ransomware ecosystem is constantly evolving, with a continuously expanding trend towards high levels of specialization and outsourcing,” Kokomazzi said, adding, “To enable the spread of advanced ransomware attacks, It poses a significant threat to the organization,” he added.

Did you find this article interesting?Please follow us twitter and LinkedIn to read more exclusive content we post.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *