Security News > 2022 > October > Imagine surviving a wiper attack only for ransomware to scramble your restored files

Imagine surviving a wiper attack only for ransomware to scramble your restored files
2022-10-18 07:31

Organizations hit earlier by the HermeticWiper malware have reportedly been menaced by ransomware unleashed this month against transportation and logistics industries in Ukraine and Poland.

Though there is an overlap in victims, it's unclear whether this Prestige ransomware and HermeticWiper are controlled by the same masterminds, according to researchers at the Microsoft Threat Intelligence Center.

"MSTIC has not yet linked this ransomware campaign to a known threat group and is continuing investigations."

Most ransomware operators tend to use a consistent approach for every victim unless a security configuration forces a change of plan.

In two methods of infection, the ransomware payload is copied to the ADMIN$ share of a remote system.

Impacket creates a Windows Scheduled Task on the victim's system to execute the payload. In the other method, Impacket is used to remotely invoke an encoded PowerShell command on the system to launch the payload. With the third technique, the ransomware payload is copied to an AD Domain Controller and deployed to targeted systems using the Default Domain Group Policy Object.


News URL

https://go.theregister.com/feed/www.theregister.com/2022/10/18/prestige_ransomware_microsoft_ukraine/