CLOP Ransomware Is Distributed in Various Format

CLOP Ransomware Is Distributed in Various Format

AhnLab ASEC has pointed out on our blog that same certificate is utilized for distribution process of Ammyy, Ammyy backdoor and CLOP ransomware. In this article, we would like to give a comprehensive view from distribution to the infection. Figure 1 below outlines the general structure of ransomware flow, which

Increase of Malware Signed with Valid Digital Certificate

Increase of Malware Signed with Valid Digital Certificate

Code signing is a process of signing a file with digital signature based on the personal information of the applicant to enhance trust and secure integrity. The file creator receives digital certificate via Certificate Authority(CA) and signs the file using the certificate.  Since the code signed file is certified by

Preemptive Defense Measures against Fileless Magniber Ransomware (V3 Behavior Detection)

Preemptive Defense Measures against Fileless Magniber Ransomware (V3 Behavior Detection)

After the distribution of Magniber recovery tools developed by AhnLab Analysis Team in 2018, Magniber has been transformed into a fileless format, disabling any kind of recovery. For successful file encryption, this fileless Magniber has evolved to bypass behavior detection and perform indiscriminate injection to unspecified processes that have privileges on

BlueCrab: The Successor of GandCrab with Different Execution Method Depending on Use of V3Lite

BlueCrab: The Successor of GandCrab with Different Execution Method Depending on Use of V3Lite

A newly emerged BlueCrab ransomware is distributed in various ways, similar to GandCrab. Its distribution methods include phishing email with a malicious document attached and phishing utility download page. AhnLab ASEC has been monitoring the distribution code of Javascript disguising as a utility program. When Javascript file(.js) downloaded from the phishing utility

Distribution and Operation of Malware ‘Crypter’ Exploiting Spam Mail

Distribution and Operation of Malware ‘Crypter’ Exploiting Spam Mail

A malicious spam mail attack that distributes malware by attaching document or archive file has been one of the most popular method among the operators. AhnLab ASEC Analysis Team analyzed spam mails received from numbers of customers and confirmed that majority of files downloaded by malicious documents attached to the

CoinMiner Infecting MBR is Distributed in Korea (DarkCloud Bootkit)

In February 2019, AhnLab ASEC discovered the spread of CoinMiner malware that disables both domestic...

[Warning] ‘Amadey’ Malware Targeting Korean Cryptocurrency Companies

Recently, AhnLab ASEC has confirmed numbers of ‘Amadey’ malware attacks targeting Korean cryptocurrency companies. The...

Does Operation ShadowHammer Only Target ASUS Certificate?

On March 25, 2019, Kaspersky Lab reported that ASUS’s software update server was compromised, causing...

Shadow of WannaCry, 2019 SMB Exploitation

WannaCry (or WannaCryptor), which infected more than 300,000 systems in May 2017 and gripped the...

Malware Installed with Coin Wallet Program Alibaba

ASEC recently discovered an information leaking malware installed along with Alibaba coin (ABBC Coin) wallet...