company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

APT

Ransomware

loading..
loading..
loading..

APT Hackers For Hire Using Ransomware Targets Financial, Entertainment Companies

A hackers-for-hire operation has been discovered using unauthentic ransomware targeting South Asian financial sectors and global entertainment firms

14-Nov-2020
2 min read

Recently a hackers-for-hire operation has been discovered using unauthentic ransomware targeting South Asian financial sectors and global entertainment firms.

Known as "CostaRicto" by reputed researchers, the campaign appears to be the creativity of APT groip who possess ransomware tooling and complex VPN proxy and SSH tunneling capabilities.

Researchers stated that CostaRicto targets are spread across different countries in Europe, Americas, Asia, Australia and Africa but the largest number is formed in South Asia (that includes India, Bangladesh and Singapore and China), suggesting that the threat actor could be based in that region but working on a wide range of commissions from widespread customers.

In this specific method, the hacker steals the information of the user and starts setting up an SSH tunnel to download a backdoor and a payload loader known as CostaBricks to implement a C++ virtual machine mechanism for decoding and injecting the bytecode payload into memory.

The backdoor comes equipped with 50 different commands to carry out tasks such as taskman, config, storage, debug, network functions that range from injecting suspicious DLLs into memory to enumerating files in storage to continuing the captured information to an attacker-controlled server.

APT-Hackers-for-hire-ransomware

Reports indicate that the backdoor is under active development.Outsourcing attacks to unauthorized money- oriented groups has multiple advantages for the opponents — it not only saves their time and resources and simplifies the procedures but also provides an additional layer of indirection to protect the real identity of the threat actor.

Found this article interesting? If Yes, then follow us on Facebook, Twitter and Instagram to keeo yourself updated with the latest Cyber Security News