Security News > 2022 > December > New Agenda Ransomware Variant, Written in Rust, Aiming at Critical Infrastructure

New Agenda Ransomware Variant, Written in Rust, Aiming at Critical Infrastructure
2022-12-19 10:05

A Rust variant of a ransomware strain known as Agenda has been observed in the wild, making it the latest malware to adopt the cross-platform programming language after BlackCat, Hive, Luna, and RansomExx.

A previous version of the ransomware, written in Go and customized for each victim, singled out healthcare and education sectors in countries like Indonesia, Saudi Arabia, South Africa, and Thailand.

Agenda, like Royal ransomware, expands on the idea of partial encryption by configuring parameters that are used to determine the percentage of file content to be encrypted.

"This tactic is becoming more popular among ransomware actors as it lets them encrypt faster and avoid detections that heavily rely on read/write file operations," a group of researchers from Trend Micro said in a report last week.

An analysis of the ransomware binary reveals that encrypted files are given the extension "MmXReVIxLV," before proceeding to drop the ransom note in every directory.

"At present, its threat actors appear to be migrating their ransomware code to Rust as recent samples still lack some features seen in the original binaries written in the Golang variant of the ransomware," the researchers noted.


News URL

https://thehackernews.com/2022/12/new-agenda-ransomware-variant-written.html