A newly uncovered form of ransomware is going after Windows and Linux systems in what appears to be a targeted campaign.
Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique which helps stay hidden on compromised networks.
The main targets of Tycoon are organisations in the education and software industries.
Tycoon has been uncovered and detailed by researchers at BlackBerry working with security analysts at KPMG. It’s an unusual form of ransomware because it’s written in Java, deployed as a trojanised Java Runtime Environment and is compiled in a Java image file (Jimage) to hide the malicious intentions.
“These are both unique methods. Java is very seldom used to write endpoint malware because it requires the Java Runtime Environment to be able to run the code. Image files are rarely used for malware attacks,” Eric Milam, VP for research and intelligence at BlackBerry told ZDNet.
“Attackers are shifting towards uncommon programming languages and obscure data formats. Here, the attackers did not need to obscure their code were nonetheless successful in accomplishing their goals,” he added.
However, the first stage of Tycoon ransomware attacks is less uncommon, with the initial intrusion coming via insecure internet-facing RDP servers. This is a common attack vector for malware campaigns and it often exploits servers with weak or previously compromised passwords.
Once inside the network, the attackers maintain persistence by using Image File Execution Options (IFEO) injection settings which more often provide developers with the ability to debug software. The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack.
“Ransomware can be implemented in high-level languages such as Java with no obfuscation and executed in unexpected ways,” said Milam.
After execution, the ransomware encrypts the network with files encrypted by Tycoon given extensions including .redrum, .grinch and .thanos – and the attackers demand a ransom in exchange for the decryption key. The attackers ask for payment in bitcoin and claim the price depends on how quickly the victim gets in touch via email.
The fact the campaign is still ongoing suggests that those behind it are finding success extorting payments from victims.
Researchers suggest that Tycoon could potentially be linked to another form of ransomware, Dharma – also known as Crysis – due to similarities in the email addresses, names of encrypted files and the text of the ransom note.
And while Tycoon does have some unique means of executing an infection, like other forms of ransomware, it’s possible to prevent it from getting that far.
As RDP is a common means of compromise, organisations can ensure that the only ports facing outward to the internet are those which require it as an absolute necessity.
Organisations should also make sure that accounts which do need access to these ports aren’t using default credentials or weak passwords which can easily be guessed as a means of breaking in.
Applying security patches when they’re released can also prevent many ransomware attacks, as it stops criminals exploiting known vulnerabilities. Organisations should also ensure they regularly backup their network – and that the backup is reliable – so that if the worst happens, the network can be restored without giving into the demands of cyber criminals.
READ MORE ON CYBERSECURITY
- Ransomware gangs are changing targets again. That could make them even more of a threat
- How ransomware attackers are doubling their extortion tacticsTechRepublic
- Ransomware is now the biggest online menace you need to worry about – here’s why
- Ransomware froze more cities in 2019 as hackers got smarterCNET
- 30 years of ransomware: How one bizarre attack laid the foundations for the malware taking over the world