NEMTY Ransomware v2.2 Spotted in Korea

NEMTY Ransomware v2.2 Spotted in Korea

On December 2, 2019, ASEC Analysis Team spotted that new NEMTY ransomware 2.2 version updated from v2.0 are distributed in Korea. All the characteristics of the new version including distribution method disguising as ‘resume’ or’ notice on illegal breach of e-commerce act’, excluded countries, infection target, excluded file and folder.

Rapidly Changing Infection Method of BlueCrab Ransomware (feat. notepad.exe)

Rapidly Changing Infection Method of BlueCrab Ransomware (feat. notepad.exe)

AhnLab ASEC Analysis Team has been monitoring BlueCrab(=Sodinokibi) ransomware in form of Javascript distributed via phishing download page. The phishing download page is masquerading as the one to download utilities, and appears on the top of Google search results as Figure 1. This is a well-known technique that has been

Be Careful with Excel File Disguised as ‘Wage Statement’ Distributed via Email

Users should be careful as many spam emails with downloader malware targeting Korean companies have...

New Stealer’s Suspicious Relationship with State-Sponsored Ryuk Ransomware?

New Stealer’s Suspicious Relationship with State-Sponsored Ryuk Ransomware?

AhnLab’s security analysts recently discovered a new stealer targeting to steal personal information. Apart from the new stealer’s purpose and how it works, similarities with the Ryuk ransomware was also an attention grabber. Ryuk ransomware, first found in 2018, is known to target specific countries.  The new stealer searches for

[Warning] Emotet Malware Distributed in the form of Document File

AhnLab ASEC analysis team has confirmed that Word files containing malicious VBA macro are distributed...

Trick or Treat! Corporate targeting Trickbot

Trick or Treat! Corporate targeting Trickbot

Trickbot, orginally a banking Trojan, aims to collect and leak corporate confidential information. Recently, attackers have distributed fake Word files and obfuscated scripts to trick corporate users in downloading the Trickbot downloader. Thereby, extra attention is required to prevent downloading Tickbot. When the user opens the Word document attachment in

Operation of SMB Vulnerability, Fileless WannaMine

Operation of SMB Vulnerability, Fileless WannaMine

A distribution method of CoinMiner has become more diversified. In early 2019, AhnLab ASEC Analysis Team introduced CoinMiner that exploits SMB vulnerability(MS17-010 EternalBlue) for distribution. Recently, it was confirmed that a fileless CoinMiner malware named “WannaMine” exploits not only SMB vulnerabilities for distribution, but also Windows Management Instrumentation (WMI), ADMIN$ shared

Discovery of the Ammyy RAT and CLOP Ransomware

Discovery of the Ammyy RAT and CLOP Ransomware

A recent rise in attacks using malicious macros in attachments has been spotted in South Korea. In February 2019, a remote control hacking tool called Flawed Ammyy RAT began to be distribute through email attachments. This hacking tool has been active since 2016 and has been distributed worldwide via email.

Analysis on the Malicious SDB File Found in Ammyy Hacking Tool

Analysis on the Malicious SDB File Found in Ammyy Hacking Tool

Early this year, there was a major distribution of Clop ransomware, mainly targeting Korean government agencies. Clop ransomware distributed using a hack tool called ‘Ammyy,’ is unlike common ransomware and attacks after a period of latency. Since the end of May 2019, Clop ransomware has emerged again with the sudden

A Closer Look at the FlawedAmmyy’s New Attack Style

Clop ransomware made a full appearance early this year, mainly targeting Korean organizations and corporations....