December 10, 2019 By David Bisson 2 min read

The Snatch ransomware reboots infected machines in Safe Mode so that it can bypass endpoint protection and encrypt users’ data.

In mid-October, the Sophos Managed Threat Response (MTR) team worked with an organization to remediate a ransomware infection in its network. This investigation found that a sample of Snatch ransomware had been responsible for the outbreak. It also determined that Snatch had set itself up as a service that ran during a Safe Mode boot, a technique that empowered the threat to bypass most security tools so that it could more effectively encrypt victims’ hard drives.

The attack described above wasn’t the first time that the Sophos MTR team came across Snatch. The security firm first encountered the malware, which comprises a ransomware component, data stealer, Cobalt Strike reverse-shell and other tools commonly used by pen testers, back in 2018. That being said, SophosLabs estimated that its Safe Mode feature is a relatively new capability for Snatch.

The Growing Trend of Evasive Ransomware

Snatch isn’t the first instance of ransomware employing evasive techniques. Back in July 2019, Comodo spotted samples of ShurLOckr ransomware that bypassed the security screenings of Google Drive and Microsoft Office 365 so that it could enter the cloud and potentially infect other users across an organization’s cloud platform.

That was just a few months before Intezer witnessed PureLocker using an anti-hooking technique and low-level Windows API functions in ntdll.dll to evade detection. In November 2019, Nyotron detected a Windows file system technique it named RIPlace that empowered malicious actors to circumvent most anti-ransomware measures.

How to Defend Against Snatch Ransomware

Security professionals can help their organizations defend against Snatch ransomware by feeding their network monitoring tools with the latest threat intelligence. Doing so will help security solutions stay on top of the latest evasion techniques employed by crypto-ransomware and other digital threats. Companies should also focus on protecting their endpoints by deploying patches on a timely basis and watching for anomalous activity.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today