New Attack TTP - Virtual Machines used for Ransomware
By MYBRANDBOOK
A new ransomware attack method takes defense evasion to a new level-deploying as a full virtual machine on each targeted device to hide the ransomware from view. In a recently detected attack, Ragnar Locker ransomware was deployed inside an Oracle VirtualBox Windows XP virtual machine. This is the first time Sophos has seen this kind of TTP used for a ransomware attack, according to Mark Loman, director of engineering, Threat Mitigation at Sophos. says, Mark Loman, director of engineering, Threat Mitigation at Sophos who further explains the attack.
SophosLabs Uncut has posted, “Ragnar Locker ransomware deploys virtual machine to dodge security,” a blog article that details a new Ragnar Locker TTP discovery, including a recent shift to deploy a well-known trusted hypervisor to hundreds of endpoints at the same time. This is the first time Sophos has seen this kind of TTP used for a ransomware attack, according to Mark Loman, director of engineering, Threat Mitigation at Sophos.
This shows on how the attackers have advanced their methods and attempts to evade detection. the research further says,
“In the last few months, we’ve seen ransomware evolve in several ways. But, the Ragnar Locker adversaries are taking ransomware to a new level and thinking outside of the box. They are deploying a well-known trusted hypervisor to hundreds of endpoints simultaneously, together with a pre-installed and pre-configured virtual disk image guaranteed to run their ransomware. Like a ghost able to interact with the material world, their virtual machine is tailored per endpoint, so it can encrypt the local disks and mapped network drives on the physical machine, from within the virtual plane and out of the detection realm of most endpoint protection products. The overhead involved to covertly run their 50 kilobyte ransomware seems like a bold, noisy move, but could pay-off in some networks that are not properly protected against ransomware,” said Mark Loman, director of engineering, Threat Mitigation at Sophos. “This is the first time we have seen virtual machines used for ransomware.”
Legal Battle Over IT Act Intensifies Amid Musk’s India Plans
The outcome of the legal dispute between X Corp and the Indian government c...
Wipro inks 10-year deal with Phoenix Group's ReAssure UK worth
The agreement, executed through Wipro and its 100% subsidiary,...
Centre announces that DPDP Rules nearing Finalisation by April
The government seeks to refine the rules for robust data protection, ensuri...
Home Ministry cracks down on PoS agents in digital arrest scam
Digital arrest scams are a growing cybercrime where victims are coerced or ...
ICONS OF INDIA : S KRISHNAN
S Krishnan as the secretary for the electronics and information techno...
ICONS OF INDIA : VIJAY SHEKHAR SHARMA
Vijay Shekhar Sharma is an Indian technology entrepreneur and multimil...
Icons Of India : ALOK OHRIE
Alok Ohrie leads Dell Technologies’ India business, overseeing Sales...
NPCI - National Payments Corporation of India
NPCI is an umbrella organization for operating retail payments and set...
ITI - ITI Limited
ITI Limited is a leading provider of telecommunications equipment, sol...
BSE - Bombay Stock Exchange
The Bombay Stock Exchange (BSE) is one of India’s largest and oldest...
Indian Tech Talent Excelling The Tech World - Aman Bhutani, CEO, GoDaddy
Aman Bhutani, the self-taught techie and CEO of GoDaddy, oversees a co...
Indian Tech Talent Excelling The Tech World - ARVIND KRISHNA, CEO – IBM
Arvind Krishna, an Indian-American business executive, serves as the C...
Indian Tech Talent Excelling The Tech World - George Kurian, CEO, Netapp
George Kurian, the CEO of global data storage and management services ...