Saturday, July 11, 17:53
Home security Ransomware is hidden in virtual machines so that it is not detectable!

Ransomware is hidden in virtual machines so that it is not detectable!

RagnarLocker ransomware operators install it application VirtualBox and run virtual machines on computers infecting, aiming to run ransomware in such a way that it is not detected by software antivirus. This trick has just been detected and analyzed by the British company cyber security Sophos, pointing to the creativity and great efforts of some ransomware gangs to avoid locating them during their attacks.

What is RagnarLocker?
RagnarLocker is no ordinary ransomware gang. It is a team that carefully selects its goals, avoiding domestic consumers and targeting only corporate networks and government agencies. THE Sophos He points out that the group has targeted victims in the past by abusing the endpoints of RDPs that have been exposed on the internet, and has even jeopardized MSP tools to infringe on companies and gain access to their internal networks. In these networks, the RagnarLocker team develops a version of its ransomware, which adapts to each victim, and then requires an astronomical amount of decryption in tens and hundreds of thousands of dollars. USA. Because each of these carefully planned attacks is a good opportunity for the team to win large sums of money, RagnarLocker has found a new trick to avoid being detected by someone. software antivirus. This trick is related to virtual machines. This is a simple and clever trick, in which the RagnarLocker gang instead of running the ransomware directly on the computer that wants to encrypt, downloads and installs it. Oracle VirtualBox, a type of software that allows users to run virtual machines. The team then configures the virtual machine to give it full access to all local and shared disk drives, allowing the virtual machine to interact with files stored outside its own storage space. The next step is to boot the virtual machine by running a bare version of the operating system. Windows XP SP3, called MicroXP v0.82.

In the final phase of the attack, RagnarLocker loads the ransomware into the virtual machine (VM) and executes it. Because ransomware runs inside the VM, antivirus software will not be able to detect it. malware ransomware activity. As for the antivirus software, the files in the system will be replaced by their encrypted versions, while all file modifications will appear to be from the application. VirtualBox. Mark Loman, director of engineering and mitigation at Sophos, told ZDNet that this is the first time they have spotted a ransomware gang abusing virtual machines during an attack, adding that in recent months, ransomware has been seen evolving with many and in various ways, however, RagnarLocker seems to have evolved to another level of ransomware.


Please enter your comment!
Please enter your name here

Every accomplishment starts with the decision to try.


The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...

Conti ransomware: Is it the successor to Ryuk ransomware?

Conti ransomware is a new threat targeting corporate networks. Its advanced capabilities allow it ...