Sunday, July 12, 16:37
Home security Tycoon ransomware: Windows and Linux computers at risk!

Tycoon ransomware: Windows and Linux computers at risk!

Tycoon ransomware

A new ransomware, recently discovered, aims systems Windows and Linux. The ransomware is called Tycoon and has been active since December 2019. Experts believe it is the work of criminals who are particularly selective in targeting their victims. Malware also uses one unusual technique that helps it stay hidden in the breached networks.

Most Tycoon victims are organizations in its branch education and software.

Tycoon was discovered and analyzed by researchers BlackBerry and KPMG. It is an unusual form ransomware, because it is written in Java, is developed as a trojanised Java Runtime Environment and appears as file Java image (Jimage) to hide his malicious intentions.

These methods are not commonly used in ransomware. "Java is rarely used to create malware because it requires the Java Runtime Environment to be able to execute the code. Also, image files are rarely used for malware attacks, "said Eric Milam, a BlackBerry executive.

"The attackers are turning to the unusual programming languages and in “weird” data formats. Here, the attackers did not have to hide their code, but they managed to achieve their goals ", he added.

Linux Windows

However, the first stage of Tycoon ransomware attacks is quite common. The initial invasion is through unsafe RDP servers. This method is often used for attacks and exploits servers with weak or already compromised passwords. access.

When they enter the network, the attackers use them Image File Execution Options (IFEO) injection settings, which often provide developers with the ability to detect software errors. The hackers they also try to disable malware protection software using it ProcessHacker.

After running, Tycoon ransomware encrypts the network. Encrypted files get extensions like .redrum, .grinch and .thanos. The attackers then ask ransom from the victims to "release" the data. The attackers are demanding ransom Bitcoin and claim that the price depends on how quickly the victim communicates through e-mail.

The fact that the campaign is still ongoing shows that attacks are successful.

Researchers believe that Tycoon could possibly be linked to another form of ransomware, Dharma (also known as Crysis), as they have several similarities.

Although Tycoon uses some rare methods of attack, we can prevent its execution.

Organizations need to properly insure their RDP servers and ensure that accounts do not use default or weak credentials.

Immediate implementation security updates It can also prevent many ransomware attacks as criminals known cannot be exploited vulnerabilities. Furthermore, the regular backups it is necessary, because even if the files are encrypted, the organizations will still have them access in these.


Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortress
Pursue Your Dreams & Live!


Financial institutions: The risk of data breach is higher!

According to a report, financial institutions tend to be at greater risk of data breach due to a lack of proper security controls ....

Google Chrome: Import, export and backup stored passwords

Google Chrome Password Manager lets you save usernames and passwords and ...

Apple: do not cover the camera on MacBook devices

Many users today have a habit of covering their laptop camera in order to protect themselves from any surveillance through it. However...

COVID-19-workplace: What can you do to avoid becoming a source of infection?

The number of COVID-19 cases worldwide seems to be increasing. However, most countries have ...

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Grandoreiro malware: What is it and how does it work?

One of the new types of malware that has caught the attention of researchers is the Grandoreiro malware. Below we will refer in detail to ...