August 9, 2016 By Larry Loeb 2 min read

Just as they did in earlier this summer, Cerber ransomware’s authors updated to a new variant by messing around with the ransomware decryption used in their criminal efforts.

Quirky From the Start

From its inception, Cerber has been a quirky and unique take on ransomware. It evades the most common antivirus checkers by updating its hash all the time. With a changed hash, the antivirus product lacks a signature to compare the malware against.

Because the malware is not explicitly on the blacklist, most antivirus products let it pass. Cerber is one of very few malware programs that has managed to pull off this kind of rapid hash change.

The malware authors have also shown they will change and revise things as needed. One such pivot was required after Trend Micro devised a free decryptor tool that cracked the first version of Cerber wide open. For a while, this threw a wrench into the criminals’ method of holding files hostage and getting money for the key.

Ransomware Decryption Is No Match

The malware authors went back to the lab yet again and emerged with new malware that has since been detected by security researchers. It shows evidence of massive alterations having been liberally applied to the program.

“Cerber v2 uses the CryptGenRandom Microsoft API to generate encryption keys, which are now 32 bytes long instead of 16 bytes,” reported Softpedia. Its new configuration also prevents the ransomware from running on PCs with certain types of security software.

Softpedia added that Cerber will not launch if it detects OS languages for the following countries: Armenia, Azerbaijan, Belarus, Georgia, Kyrgyzstan, Kazakhstan, Moldova, Russia, Turkmenistan, Tajikistan, Ukraine and Uzbekistan.

One researcher involved in the Trend Micro effort noted that there was no solution available for the latest Cerber ransomware variants. Users can only hope that security firms are trying to replicate past success by creating a ransomware decryption tool for the more sophisticated version of this malware.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now.The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP).DMP’s benefits and vulnerabilitiesDMP predicts memory addresses that the code is most…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today