• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New Prestige Ransomware Targeting Polish and Ukrainian Organizations

You are here: Home / Cyber Security News / New Prestige Ransomware Targeting Polish and Ukrainian Organizations

A new ransomware campaign focused the transportation and logistics sectors in Ukraine and Poland on Oct 11 with a earlier mysterious payload dubbed Prestige.

“The activity shares victimology with new Russian state-aligned exercise, exclusively on influenced geographies and nations around the world, and overlaps with former victims of the FoxBlade malware (also regarded as HermeticWiper),” the Microsoft Risk Intelligence Heart (MSTIC) explained.

The tech giant remarked the intrusions happened inside an hour of each individual other throughout all victims, attributing the infections to an unnamed cluster known as DEV-0960. It did not disclose the scale of the attacks, but said it is notifying all affected prospects.

The campaign is also believed to be unique from other the latest destructive attacks that have involved the use of HermeticWiper and CaddyWiper, the latter of which is released by a malware loader named ArguePatch (aka AprilAxe).

The system of first obtain stays unknown, with Microsoft noting that the danger actor experienced by now obtained privileged accessibility to the compromised natural environment to deploy the ransomware applying 3 unique strategies.

In a similar development, Fortinet FortiGuard Labs took the wraps off a multi-phase attack chain that leverages a weaponized Microsoft Excel document, which masquerades as a spreadsheet for making salaries for Ukrainian military services staff to fall Cobalt Strike Beacon.

“The risk landscape in Ukraine proceeds to evolve, and wipers and damaging attacks have been a dependable concept,” Redmond famous. “Ransomware and wiper attacks depend on many of the similar security weaknesses to realize success.”

The conclusions come amid an explosion of comparatively new ransomware strains that have been attaining traction on the risk landscape, together with that of Bisamware, Chile Locker, Royal, and Ransom Cartel, about the past number of months.

Ransom Cartel, which surfaced in mid-December 2021, is also noteworthy for sharing technical overlaps with REvil ransomware, which shut shop in Oct 2021 following enormous law enforcement scrutiny into its functions following a string of large-profile attacks on JBS and Kaseya.

It is really suspected that “Ransom Cartel operators had obtain to earlier variations of REvil ransomware source code,” Palo Alto Networks Unit 42 noticed on Oct 14, stating that “there was a romance between the teams at some issue, while it could not have been modern.”

REvil, previously this January, experienced further setback when Russian authorities arrested numerous members, but there are indications that the infamous cybercrime cartel could have staged a return in some variety.

Cybersecurity agency Trellix, in late September, also disclosed how a “disgruntled interior supply” from the team shared particulars about the adversary’s Strategies, Tactics and Procedures (TTPs), lending a critical perception into the “associations and internal workings of REvil and its customers.”

It can be not just REvil that’s back on the ransomware radar. HP Wolf Security very last week reported it isolated a Magniber campaign that has been located focusing on Windows home buyers with bogus security updates which hire a JavaScript file to proliferate the file-encrypting malware.

“The attackers used clever procedures to evade protection and detection mechanisms,” malware analyst Patrick Schläpfer pointed out. “Most of the an infection chain is ‘fileless,’ indicating the malware only resides in memory, reducing the likelihood of it becoming detected.”

Observed this report fascinating? Stick to THN on Facebook, Twitter  and LinkedIn to study a lot more special content we article.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Hackney Council Ransomware Attack Cost £12m+
Next Post: Why Crypto Winter is No Excuse to Let Your Cyber Defenses Falter »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Deepfake Defense in the Age of AI
  • North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

Copyright © 2025 · AllTech.News, All Rights Reserved.