Researchers Link White Rabbit Ransomware To FIN8 Hackers

Share post:

A new ransomware “White Rabbit” was discovered by ransomware expert Michael Gillespie.

Based on a sample analyzed from one of its attacks in December 2021, Trend Micro researchers shared some details about ransomware.

This includes the fact that the ransomware executable is a small payload that weighs in at 100 KB file. It requires a password that must be entered during command-line execution to decrypt the malicious payload.

Once executed with the correct password, the ransomware scan all the folders on the device and encrypts targeted files, while it creates ransom notes for each encrypted file.

In the process of encrypting a device, removable network drives are also targeted. However, Windows system folders are excluded from encryption to prevent the operating system from becoming unusable.

Trend Micro’s report linked the ‘White Rabbit’ operation to the FIN8 ransomware group, a financially motivated group that uses POS malware to steal credit card data.

According to researchers, ‘White Rabbit’ uses a never-before-seen version of Badhatch. Badhatch (aka Sardonic) is a backdoor associated with FIN8.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways