Rewterz Threat Alert – Chaos Ransomware – Active IOCs

Severity

High

Analysis Summary

Chaos is a customizable ransomware builder that emerged on June 9 2021 (in underground forums) by falsely marketing itself as the .NET version of Ryuk despite sharing no such overlaps with the notorious counterpart. Since then, it has undergone active development and quick advancements, which have persuaded several attacker groups to adopt it. The most recent version, known as Yashma, was observed in the wild in May 2022. Yashma allows attackers to configure the ransomware so that it does not execute dependent on the language chosen on the victim’s device. It can also disable antivirus software, backup services, storage services, remote desktop services, and credential vault services on victims’ machines. Malware developers frequently employ this strategy to avoid infecting computers in their own region, which would draw the attention of local law authorities. The Chaos ransomware generator is said to still lack some of the capabilities that are seen in many existing ransomware families.

Chaos Ransomware is a serious threat to individuals and organizations, as it can result in the loss of valuable data and disruption to normal business operations. To protect against Chaos Ransomware and other similar threats, it is recommended that individuals and organizations implement a robust cybersecurity program, including regular software updates, anti-malware protection, and employee training on the dangers of phishing and social engineering.

Impact

File Encryption

Indicators of Compromise

MD5

697deef7b2ca6b79c3608ebdf9c70977825ed45d7ece9ce8c2e0222225096a3247e14a46326791625b67704d4329bed6

SHA-256

8a6aa9e5d58784428d0b1641e99f024438b20747993039e16b8d262f3f5fd347b8a0caadf78b63714aa008164ba51694c2a33830cf1377d1b5a143317016254b6312ac91761037de7a7afc7323671a004db71b31a69499178437bdf939fa9dd8

SHA-1

64fb76029f4d7b3aa06646f286182daf4de2a27ae7b69dd73ffc65d81ccc320fe27ee32471d0c1f201e0e607678a36d8e7e23d1fb11f8d7aa2c20581

Remediation

Block all threat indicators at your respective controls.Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controlsMaintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.Emails from unknown senders should always be treated with caution.Never trust or open ” links and attachments received from unknown sources/senders

The post Rewterz Threat Alert – Chaos Ransomware – Active IOCs first appeared on Rewterz.

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Generated by Feedzy