Analysis of Gunra Ransomware Using Vulnerable Random Number Generation Function (Distributed for Linux Environments in ELF Format)

Analysis of Gunra Ransomware Using Vulnerable Random Number Generation Function (Distributed for Linux Environments in ELF Format)

The Gunra ransomware group, which began its activities in April 2025, has been launching continuous attacks against various industries and companies around the world. Cases of damage have been reported in Korea as well. The distributed Gunra ransomware is available in two formats: an EXE file format for Windows environments

Analysis of Qilin Ransomware  Using Selective Encryption Algorithm  (Distributed Targeting Linux, ELF Type)

Analysis of Qilin Ransomware Using Selective Encryption Algorithm (Distributed Targeting Linux, ELF Type)

There has recently been a surge in the tendency for attacks targeting Korean asset and investment management companies. As described in this report, the ransomware encrypts files with an AES symmetric key and then encrypts that AES symmetric key with an RSA public key. This means that the possibility of

Analysis on the Qilin Ransomware Using Selective Encryption Algorithm

Analysis on the Qilin Ransomware Using Selective Encryption Algorithm

Recently, Qilin ransomware has been launching continuous attacks on companies in various countries and industries around the world, and cases of damage have also been identified in South Korea. This post analyzes the key features and encryption methods of Qilin ransomware, as well as the technical reasons why decryption is

Kawa4096 Ransomware: Leveraging Brand Mimicry for Psychological Impact

Kawa4096 Ransomware: Leveraging Brand Mimicry for Psychological Impact

In June 2025, a new ransomware group known as Kawa4096 emerged, targeting multinational organizations across various sectors, including finance, education, and services. Their attacks have affected companies in multiple countries, notably Japan and the United States. Although there is currently no public information confirming whether they operate as a Ransomware-as-a-Service (RaaS) or

Detecting Malware Exploiting Linux PAM through AhnLab EDR

Detecting Malware Exploiting Linux PAM through AhnLab EDR

Pluggable Authentication Modules (PAM) is a modular framework that allows applications such as su, sudo, and sshd to perform security policy logic such as authentication without implementing it directly. Applications delegate authentication to the libpam library, which then loads and executes PAM modules according to the configuration information before aggregating

Detecting Akira Ransomware Attack Using AhnLab EDR

Detecting Akira Ransomware Attack Using AhnLab EDR

Akira is a relatively new ransomware threat actor that has been active since March 2023. Like other ransomware threat actors, they breach organizations and not only encrypt their files but also exfiltrate sensitive information to use in negotiations. As shown in the following 2024 statistics, the number of companies affected

AhnLab EDR Detects CoinMiner Propagated via USB in South Korea

AhnLab EDR Detects CoinMiner Propagated via USB in South Korea

1. Overview CoinMiners typically secretly use the CPU and GPU resources of users’ computers to mine cryptocurrencies, which slows down the performance of the affected computers. CoinMiners are usually distributed through phishing emails, malicious websites, system vulnerabilities, and other means. For analysis of this malware, please refer to the AhnLab

Play Ransomware Attack Cases Detected by AhnLab EDR

Play Ransomware Attack Cases Detected by AhnLab EDR

Play ransomware, also known as Balloonfly or PlayCrypt, was first identified in June 2022 and has reportedly attacked over 300 organizations worldwide since then. A notable characteristic of the ransomware, which remains actively in use, is its addition of the “.PLAY” extension to files following encryption. Like other ransomware threat

Proxy Tools Detected by AhnLab EDR

Proxy Tools Detected by AhnLab EDR

After gaining control over infected systems, threat actors may also perform remote screen control using RDP. This is partly for convenience but can also serve the purpose of maintaining persistence. If the RDP service is not active during the attack process, threat actors may install RDP Wrappers, steal existing account

Infected Systems Controlled Through Remote Administration Tools – Detected by EDR (2)

Infected Systems Controlled Through Remote Administration Tools – Detected by EDR (2)

Remote administration tools, also known as RAT, are software that provide the ability to manage and control terminals at remote locations. Recently, there has been an increase in cases where remote administration tools are installed instead of backdoor malware during the initial access or lateral movement phases to control the