New Ransomware

SpearTip | July 29th, 2021

 

These two new ransomware variants are either new or old REvil & Darkside rebrands. Both are looking for high-profile targets to receive financial gain.

New Ransomware Appeared

As we’ve mentioned before, it’s not unusual for ransomware groups to repopulate with different aliases. Haron was the first new ransomware group to appear this month, and the BlackMatter is the second.

They both claim to be targeting companies with high revenue that can pay ransoms in the millions of dollars. They’re also using a similar language as DarkSide to spare hospitals, key infrastructure, and nonprofit organizations.

BlackMatter also promised free decryption if its affiliates’ attack methods freeze files at corporations. This is similar to what DarkSide explained on their leak site after their attack on the Colonial Pipeline. 

On July 19, the first Haron malware sample was uploaded to VirusTotal.  S2W, a South Korean security firm, reported about the group three days later in an article that shows similarities between Haron and Avaddon.

Avaddon was another well-known ransomware-as-a-service (RaaS) provider that disappeared following the heightened awareness among law enforcement. Avaddon released 2,934 decryption keys to BleepingComputer, with each key belonging to a specific victim. According to law enforcement, Avaddon’s average extortion price was over $40,000, meaning the operators and their connections quit and walked away from millions.

S2W Lab wrote on July 22 that when Haron ransomware is installed, “the extension of the encrypted file is changed to the victim’s name.” Haron is like the Avaddon ransomware in which the operators are using a ransom note and running their leak website. S2W included side-by-side photographs of the two groups’ ransom notes in its post.

There are other similarities between the two new ransomware variants including:

  • On the two negotiation sites, there’s more cut-and-paste verbiage
  • The negotiating sites have nearly identical appearances, except the ransomware name “Avaddon” has been replaced with “Haron.”
  • Identical sections of open-source JavaScript code used for talking that were previously posted on a Russian developer forum.
  • The two leak websites use the same structure.

If Harron is Avaddon resurrected, their strategy would include negotiations by scheduling the next data update. Another difference is that we have not seen a triple-threat play from Haron. A triple-threat attack is when not only is data locally encrypted and exfiltrated before the ransom demand is issued, but uncooperative victims are also threatened with denial-of-service (DDoS) attacks until comply.

Haron’s negotiation time is six days whereas Avaddon allowed 10 days for negotiation.  S2W Lab explains that Haron is running on the Thanos ransomware.

BlackMatter is the second new ransomware strain to recently appear. According to Flashpoint, a risk intelligence firm, BlackMatter opened an account on underground forums XXS and Exploit on July 19 and deposited 4 bitcoins (about USD 150,000 as of Wednesday afternoon) into its Exploit account.

As supposedly old ransomware groups under new ransomware names begin reappearing in the threat landscape, keeping current with new ransomware threats is very important for your company’s protection. It’s vital to incorporate an advanced security team like SpearTip to continuously monitor your network because an average IT team may not always be equipped or technical enough to deal with these threats.

We can help your company understand where your weak points are located by offering you our pre-breach, advisory services. Our Security Operations Center as a Service (SOCaaS) operates 24/7/365 and provides our clients access to our certified engineers. Threat actors never rest or take a holiday when it comes to targeting your business, so that’s why a 24/7 service is so beneficial.

Our ShadowSpear platform detects threats early and blocks them from accessing your network.

If your company is experiencing a breach, call our Security Operations Center at 833.997.7327 to speak directly with an engineer.

Categories

Connect With Us

Featured Articles

Industries Vulnerable to Cyberattacks
Industries Vulnerable to Cyberattacks in 2023
24 April 2024
Cybersecurity Health Checks
Cybersecurity Health Checks: Why Companies Need Them
22 April 2024
New Loop DoS Attack
New Loop DoS Attack Affecting Linux Systems
19 April 2024
Possible Cyberattack
Possible Cyberattack During 2024 Summer Olympics
15 April 2024

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.