Skip to content
  Monday 23 June 2025
  • Home
  • Attack
  • Malware
  • Cloud
  • Data
  • Technology
  • World of tech
Trending
February 8, 2024FTX Hacker Was A SIM Swapper April 9, 2024Google partners with Bayer on new AI product for radiologists April 30, 2025City of Long Beach Says at Least 260,000 Affected by Hack August 10, 2023Trump’s Truth Social tipped FBI to man killed during arrest attempt for Biden threats May 1, 2025Why top SOC teams are shifting to Network Detection and Response November 17, 2023Amazon says employees may not get promoted if they ignore return-to-office mandate August 8, 2024University Professors Targeted by North Korean Cyber Espionage Group September 11, 2024DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe September 23, 2024New PondRAT Malware Hidden in Python Packages Targets Software Developers August 29, 2023Google Cloud Next ‘23: New Generative AI-Powered Services
  • Home
  • Attack
  • Malware
  • Cloud
  • Data
  • Technology
  • World of tech
  Attack  New Yashma Ransomware Variant Targets Multiple English-Speaking Countries
Attack

New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

adminadmin—August 8, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


Aug 08, 2023THNEndpoint Security / Malware

Yashma Ransomware

An unknown threat actor is using a variant of the Yashma ransomware to target various entities in English-speaking countries, Bulgaria, China, and Vietnam at least since June 4, 2023.

Cisco Talos, in a new write-up, attributed the operation with moderate confidence to an adversary of likely Vietnamese origin.

“The threat actor uses an uncommon technique to deliver the ransom note,” security researcher Chetan Raghuprasad said. “Instead of embedding the ransom note strings in the binary, they download the ransom note from the actor-controlled GitHub repository by executing an embedded batch file.”

Yashma, first described by the BlackBerry research and intelligence team in May 2022, is a rebranded version of another ransomware strain called Chaos. A month prior to its emergence, the Chaos ransomware builder was leaked in the wild.

A notable aspect of the ransom note is its resemblance to the well-known WannaCry ransomware, possibly done so in an attempt to obscure the threat actor’s identity and confuse attribution efforts. While the note mentions a wallet address to which the payment is to be made, it doesn’t specify the amount.

Cybersecurity
More stories

New “Whiffy Recon” Malware Triangulates Infected Device Location via Wi-Fi Every Minute

August 24, 2023

Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping

June 26, 2024

Phishers Exploit Salesforce’s Email Services Zero-Day in Targeted Facebook Campaign

August 2, 2023

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

March 14, 2025

The disclosure comes as the cybersecurity company said that leaks of ransomware source code and builders are leading to the acceleration of new ransomware variants, thereby resulting in more attacks.

“Ransomware builders usually have a user interface that allows users to choose the underlying features and customize the configurations to build a new ransomware binary executable without exposing the source code or needing a compiler installed,” the company pointed out.

“The availability of such builders allows novice actors to generate their own customized ransomware variants.”

The development also follows a major spike in ransomware attacks, with Malwarebytes recording as many as 1,900 incidents over the past year within the U.S., Germany, France, and the U.K., mainly fueled by the “ascension of the Cl0p group – which has effectively harnessed zero-day vulnerabilities to amplify its attacks.”

In a related report, Akamai found that an increase in the use of zero-day and one-day security flaws has resulted in a 143% increase in the number of ransomware victims in the first quarter of 2023 compared with the same period last year.

Cybersecurity

“The Cl0p ransomware group is aggressively developing zero-day vulnerabilities, growing its victims by 9x year over year,” the company said. “Victims of multiple ransomware attacks were more than 6x more likely to experience the second attack within three months of the first attack.”

But in what’s a further sign of the evolution of the threat landscape, Trend Micro disclosed details of a TargetCompany (aka Mallox or Xollam) ransomware attack that utilized an iteration of a fully undetectable (FUD) obfuscator engine called BatCloak to infect vulnerable systems with remote access trojans like Remcos RAT and maintain a stealthy presence on targeted networks.

“Afterward, the Remcos RAT will resume its final routine as it downloads and deploys the TargetCompany ransomware still wrapped in an FUD packer,” the company said.

“The use of FUD malware already limits most available solutions for this said tactic, even more so for off-the-shelf technologies likely susceptible to other attacks (not just ransomware). This set of packers will likely not be the only ones being developed in the near future.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

admin

Understanding Active Directory Attack Paths to Improve Security
Hackers Abusing Cloudflare Tunnels for Covert Communications
Related posts
  • Related posts
  • More from author
Attack

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

June 21, 20250
Attack

Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms

June 20, 20250
Attack

Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider

June 20, 20250
Load more

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Data

Free Tools to Test Website Accessibility

June 22, 20250
Data

What the Rise of AI Web Scrapers Means for Data Teams

June 22, 20250
Attack

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

June 21, 20250
Malware

Court Ditches HIPAA Reproductive Health Info Privacy Rule

June 21, 20250
Malware

Aflac attack – GovInfoSecurity

June 20, 20250
Malware

AdaCore Merges With CodeSecure for Unified Developer Tools

June 20, 20250
Load more

Recent Posts

  • Free Tools to Test Website Accessibility
  • What the Rise of AI Web Scrapers Means for Data Teams
  • Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages
  • Court Ditches HIPAA Reproductive Health Info Privacy Rule
  • Aflac attack – GovInfoSecurity

    © 2022
    • Home
    • Attack
    • Cloud
    • Data
    • Malware
    • Technology
    • World of tech
    • Privacy
    • Contact