August 27, 2019 By David Bisson 2 min read

A sample of the Nemty ransomware family hid a strongly worded message directed at the antivirus industry within its code.

In its analysis of the threat, Bleeping Computer found that the ransomware deleted the shadow copies for the files it encrypted. This step effectively removed one way by which victims could recover their files for free. Upon completing its encryption routine, the crypto-malware then displayed a ransom note instructing victims to visit a payment portal hosted on the Tor network and submit 0.09981 BTC (worth $1,010.74 at the time of writing) in exchange for a decryption tool.

This particular ransomware stood out among other families, however, because it arrived with several messages hidden in its code. First, Bleeping Computer observed that the sample used “hate” as the name for its mutex object. Second, researchers noted how Nemty used a strongly worded message directed at the antivirus industry as the name for its key that decodes base64 strings and creates URLs.

A Look at Other Threats’ Hidden Messages

Nemty isn’t the only threat with hidden messages in its code. In December 2015, for instance, Emsisoft analyzed a variant of Radamant ransomware and found that the executables and domain names for the threat’s command-and-control (C&C) servers used strings that expressed displeasure toward the security firm.

Just a few months after in June 2016, the antivirus provider came across a sample of Apocalypse directing insults at its research team. That’s around the same time that Bleeping Computer reported on a sample of Black Shades Crypter ransomware that used hidden messages to taunt security researchers who might be analyzing it.

How to Defend Against Nemty Ransomware

Security professionals can bolster enterprise defenses against threats like Nemty ransomware by developing an incident response plan and practicing it ahead of real attacks. Organizations should also continue to focus on user education by investing in a security awareness training program that helps employees learn about phishing attacks, ransomware and other threats.

 

UPDATE: Researchers at Tesorion took a close look at Nemty and noticed a few crucial deviations in the threat’s implementation of the AES-CBC encryption algorithm. Using those deviations, the researchers developed a process that allows victims in some cases to recover their affected files for free.

More from

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Threat intelligence to protect vulnerable communities

2 min read - Key members of civil society—including journalists, political activists and human rights advocates—have long been in the cyber crosshairs of well-resourced nation-state threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a High-Risk Communities Protection (HRCP) report developed through the Joint Cyber Defense Collaborative that addresses the threat to these vulnerable groups, with findings contributed by the X-Force Threat Intelligence team.Cyber criminals seek stolen credentialsThe HRCP…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today