November 18, 2019 By David Bisson 3 min read

Last week in security news, researchers observed the new PureLocker ransomware family using some unusual techniques to target enterprise production servers. Ransomware wasn’t the only type of malware that made headlines last week. A PowerShell-based script, a new backdoor and an info-stealing Trojan also generated attention in the security community for using interesting tactics and staging new attack campaigns.

Top Story of the Week: PureLocker’s Unique Tactics

Intezer and IBM X-Force Incident Response and Intelligence Services (IRIS) first came across PureLocker when they detected a sample masquerading as a C++ cryptography library called Crypto++. Further analysis revealed that the sample actually belonged to a ransomware family written in the PureBasic programming language, hence the name PureLocker.

Researchers observed the ransomware using two unusual techniques in its efforts to exclusively target enterprises’ production servers. First, they noticed PureLocker using several checks to verify the nature of its execution, a tactic that suggests the ransomware might be functioning as a component of a multi-stage attack. Second, they noticed the sample using anti-evasion tactics that other ransomware families rarely employ.

Source: iStock

Also in Security News

  • Mortality Rate From Heart Attacks Increased at Hospitals Following Data Breaches: An academic study found that the time until patients suffering from cardiovascular issues received a cardiogram grew by 2.7 minutes at hospitals that suffered a data breach. The mortality rate for these patients also increased 0.36 percent for three years following the security incident.
  • Mobile Users Urged to Be on the Lookout for Fleeceware: Kaspersky Lab noted that digital fraudsters are targeting mobile users with fleeceware, apps that charged high subscription fees to users even after they uninstalled them from their devices. These apps aren’t considered malware, however, in that they don’t perform malicious activity or request unusual permissions.
  • New Titanium Backdoor Used by Platinum Group to Target APAC Region: Detected by Kaspersky Lab, the Platinum Group launched a campaign that used encryption and fileless techniques to target South and Southeast Asian companies. Each step of the attack mimicked the activity of known software to ultimately load the Titanium backdoor.
  • Over Half of Q3 2019 DDoS Attacks Occurred in September: In its report findings published on Securelist, Kaspersky Lab revealed that September accounted for 53 percent of all distributed denial-of-service (DDoS) attacks that occurred in the third quarter of the year. Interestingly, 60 percent of all DDoS attacks in the early fall targeted education-related resources.
  • Glimpse Malware Capable of Using Alternative DNS to Evade Detection: IronNet found that Glimpse malware is capable of using text mode as an alternative Domain Name System (DNS) instead of relying on existing .NET DNS libraries. This technique makes it easier for the threat to evade detection by IT security teams.
  • Scam Uses Fake Bitcoin Private Key Generator to Spread Predator the Thief: Bleeping Computer learned of a scam campaign using YouTube videos to advertise a tool that claimed it could generate the private key of a bitcoin address, thereby helping users to steal other people’s funds. In reality, this tool infected users with Predator the Thief information-stealing malware.
  • New Pipka JavaScript Skimmer Targeting E-Commerce Merchants: In September 2019, Visa Payment Fraud Disruption found a new JavaScript-based skimmer infiltrating the payment forms of e-commerce merchants’ websites. Researchers found that the malware, named Pipka, removes itself from the HTML code of a compromised site, thereby increasing the likelihood that it’ll evade detection.
  • AnteFrigus Ransomware Not Targeting the C: Drive: In mid-November, Bleeping Computer learned of a malvertising campaign that’s using the RIG exploit kit to distribute samples of a new ransomware family called AnteFrigus. The threat differs from most ransomware families in that it targets removable drives and mapped network drives instead of the C: drive.
  • Growth in Number of Look-Alike Domains More Than Doubled in a Year: Researchers at Venafi found that the number of look-alike domains more than doubled between 2018 and 2019. Many of those domains targeted major retailers and used TLS certificates to lure users into a false sense of security.

Security Tip of the Week: Defend Against a Ransomware Attack

Security professionals can help their organizations prevent a ransomware infection by embracing the philosophy of threat hunting and using ethical hackers who can help identify gaps in their defenses. Companies should also make sure to implement a robust data backup strategy and test these backups so they can recover from a ransomware attack should they suffer one.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today