August 27, 2019 By David Bisson 2 min read

A sample of the Nemty ransomware family hid a strongly worded message directed at the antivirus industry within its code.

In its analysis of the threat, Bleeping Computer found that the ransomware deleted the shadow copies for the files it encrypted. This step effectively removed one way by which victims could recover their files for free. Upon completing its encryption routine, the crypto-malware then displayed a ransom note instructing victims to visit a payment portal hosted on the Tor network and submit 0.09981 BTC (worth $1,010.74 at the time of writing) in exchange for a decryption tool.

This particular ransomware stood out among other families, however, because it arrived with several messages hidden in its code. First, Bleeping Computer observed that the sample used “hate” as the name for its mutex object. Second, researchers noted how Nemty used a strongly worded message directed at the antivirus industry as the name for its key that decodes base64 strings and creates URLs.

A Look at Other Threats’ Hidden Messages

Nemty isn’t the only threat with hidden messages in its code. In December 2015, for instance, Emsisoft analyzed a variant of Radamant ransomware and found that the executables and domain names for the threat’s command-and-control (C&C) servers used strings that expressed displeasure toward the security firm.

Just a few months after in June 2016, the antivirus provider came across a sample of Apocalypse directing insults at its research team. That’s around the same time that Bleeping Computer reported on a sample of Black Shades Crypter ransomware that used hidden messages to taunt security researchers who might be analyzing it.

How to Defend Against Nemty Ransomware

Security professionals can bolster enterprise defenses against threats like Nemty ransomware by developing an incident response plan and practicing it ahead of real attacks. Organizations should also continue to focus on user education by investing in a security awareness training program that helps employees learn about phishing attacks, ransomware and other threats.

 

UPDATE: Researchers at Tesorion took a close look at Nemty and noticed a few crucial deviations in the threat’s implementation of the AES-CBC encryption algorithm. Using those deviations, the researchers developed a process that allows victims in some cases to recover their affected files for free.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today