Home > Cyber News > New Yashma Ransomware Targets English-Speaking Nations
CYBER NEWS

New Yashma Ransomware Targets English-Speaking Nations

In a concerning development, an unidentified threat actor has unleashed a new variant of the Yashma ransomware, initiating a string of attacks on diverse entities across English-speaking countries, Bulgaria, China, and Vietnam. These malicious activities have been ongoing since June 4, 2023, raising significant alarms within the cybersecurity community.

New Yashma Ransomware Targets English-Speaking Nations

Yashma Ransomware’s Evolution from Chaos

Fresh insights provided by Cisco Talos reveal a noteworthy twist in the ongoing operation. This initiative, attributed to a potential Vietnamese origin, introduces an innovative approach to delivering ransom notes. Instead of embedding ransom note strings directly into the binary, the threat actor employs an unconventional method. By executing an embedded batch file, the ransom note is fetched from a GitHub repository under their control.

Dating back to its initial description by the BlackBerry research and intelligence team in May 2022, the Yashma ransomware has emerged as a rebranded iteration of the Chaos ransomware strain. Interestingly, the precursor Chaos ransomware builder had been leaked into the wild a month before Yashma’s debut, revealing the evolutionary path of this cyber threat.




Intriguing Parallels to Infamous WannaCry Ransomware Noted

An intriguing aspect of the ransom note utilized by the Yashma ransomware campaign draws parallels to the well-known WannaCry ransomware. This resemblance serves as an apparent strategy to obscure the true identity of the threat actor and complicate attribution efforts. While the ransom note does indicate a payment wallet address, it deliberately withholds the specific payment amount, adding an extra layer of complexity to the unfolding scenario.

The recent disclosure sheds light on an escalating cybersecurity concern. The leakage of ransomware source code and builders has been identified as a significant catalyst behind the proliferation of novel ransomware variants, resulting in a surge of cyberattacks across digital ecosystems.

User-Friendly Ransomware Builders on the Rise

A noteworthy aspect of this trend is the user-friendly interface offered by ransomware builders. This interface empowers threat actors, including less experienced ones, to select specific functionalities and customize configurations, leading to the creation of unique ransomware binary executables. This accessibility, while democratizing the creation of ransomware, raises alarming implications for the evolving threat landscape.

A Sharp Rise in Ransomware Attacks Driven by Zero-Day Exploits

Concurrently, an uptick in ransomware attacks has been attributed to the ascendancy of the Cl0p group. Leveraging zero-day vulnerabilities, this group has remarkably amplified its campaigns. In an insightful report, Akamai reveals a staggering 143% surge in ransomware victims during Q1 2023, attributed to the strategic utilization of zero-day and one-day security flaws.

Delving deeper, the Cl0p ransomware group’s rapid evolution in exploiting zero-day vulnerabilities has resulted in a ninefold increase in victim counts year over year. Furthermore, the research underscores a concerning trend – individuals targeted by multiple ransomware attacks are over six times more likely to fall victim to subsequent attacks within a brief three-month window.




Ingenious Application of Fully Undetectable (FUD) Obfuscator Engine

Reinforcing the dynamic nature of the threat landscape, Trend Micro offers insights into a targeted ransomware attack attributed to the TargetCompany group. This attack ingeniously deploys a fully undetectable (FUD) obfuscator engine named BatCloak, enabling the incursion of remote access trojans such as Remcos RAT. The sophistication of this approach allows threat actors to maintain a covert presence within compromised networks.

As these tactics evolve, encompassing FUD malware and innovative packers, the cybersecurity community faces a persistent challenge. The imperative to adapt and fortify defenses remains paramount, given threat actors’ persistent exploration of new avenues to infiltrate systems and execute malicious agendas.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree