Beware of a New Type of Ransomware Similar to ThunderCrypt
#1
Exclamation 
Quote:
[Image: MicrosoftTeams-image-23-2.png]

It Is Still Unclear If Lorenz Ransomware Is the Same Group or Inherited the Source Code to Create Its Own Version.

There’s a new ransomware operation in town and it targets organizations around the world with customized attacks.

Dubbed Lorenz, the ransomware gang began operating a month ago and has since compiled a growing list of victims whose stolen data has been published on a data leak site, as reported by BleepingComputer.

According to ID Ransomware’s Michael Gillespie, the Lorenz ransomware encryptor is the same as ThunderCrypt operation, but it’s not yet known if Lorenz is the same group or purchased the ransomware source code to create its own variant.

Similar to other ransomware attacks, Lorenz breaches a network and spreads laterally to other devices until it gains access to Windows domain administrator credentials.
 
Quote:While spreading throughout the system, they will harvest unencrypted files from victims’ servers, which they upload to remote servers under their control. This stolen data is then published on a dedicated data leak site to pressure victims to pay a ransom or to sell the data to other threat actors.

Below, you can see a Lorenz data leak website that is currently listing twelve victims, while having exposed data for ten of them.

Unlike other ransomware gangs, Lorenz pressures its victims into paying the ransom by making the data available for sale to other attackers or possible competitors. After a while, they start releasing password-protected RAR archives with the victim’s sensitive information.

Finally, if the victim doesn’t pay the ransom, and the data is not purchased, Lorenz releases the password for the archives so that they are publicly available to anyone who downloads the files. Together with the data, the ransomware gang sells access to the victim’s internal network, which can prove to be more useful to some cybercriminals.

As mentioned above, the threat actors customize the malware executable for the specific organization they are targeting.
 
Quote:When encrypting files, the ransomware uses AES encryption and an embedded RSA key to encrypt the encryption key. For each encrypted file, the .Lorenz.sz40 extension will be appended to the file’s name. Unlike other enterprise-targeting ransomware, the Lorenz sample we looked at did not kill processes or shut down Windows services before encrypting.

Every folder on the computer will be a ransom note named HELP_SECURITY_EVENT.html with information explaining what happened to a victim’s files, a link to the Lorenz data leak site, and a link to a unique Tor payment site where the victim can make the payment.

According to BleepingComputer, Lorenz ransom demands range from $500,000 to $700,000.

As new types of ransomware emerge, researchers decrypt some strains, but others get new variants, and it may look like a cat and mouse game, in which proactivity is vital. Paying the ransom never guarantees you actually get your data back, as it might still end up for sale on the Dark Web.

Therefore, prevention remains the best medicine as always. HeimdalTMThreat Prevention protects your endpoints and network against ransomware and data exfiltration with proprietary DNS security technology that spots and stops threats at the DNS, HTTP, and HTTPs layers. Coupled with the HeimdalTM Ransomware Encryption Protection, ransomware gangs won’t stand a chance.
...
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • Deep900
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard Browser Extension 5.1.101 (MV3 s...
AdGuard Browser Ex...harlan4096 — 07:39
Europe just launched DNS4EU, a public DN...
DNS is one of the ...harlan4096 — 07:36
LibreOffice 25.2.4
LibreOffice 25.2.4...harlan4096 — 07:25
K-Lite Codec Pack 19.0.0 / 18.9.7 Update
Changes in 19.0.0:...harlan4096 — 07:24
Microsoft Edge 137.0.3296.68
Version 137.0.3296...harlan4096 — 07:23

[-]
Birthdays
Today's Birthdays
avatar (48)rapedDow
avatar (43)Johnsonsyday
avatar (48)Groktus
avatar (40)efodo
Upcoming Birthdays
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (38)biobdam
avatar (41)zacforat
avatar (46)NemrokReks
avatar (37)Barrackleve
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (47)vadimTob
avatar (37)leannauu4
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>