August 27, 2019 By David Bisson 2 min read

A sample of the Nemty ransomware family hid a strongly worded message directed at the antivirus industry within its code.

In its analysis of the threat, Bleeping Computer found that the ransomware deleted the shadow copies for the files it encrypted. This step effectively removed one way by which victims could recover their files for free. Upon completing its encryption routine, the crypto-malware then displayed a ransom note instructing victims to visit a payment portal hosted on the Tor network and submit 0.09981 BTC (worth $1,010.74 at the time of writing) in exchange for a decryption tool.

This particular ransomware stood out among other families, however, because it arrived with several messages hidden in its code. First, Bleeping Computer observed that the sample used “hate” as the name for its mutex object. Second, researchers noted how Nemty used a strongly worded message directed at the antivirus industry as the name for its key that decodes base64 strings and creates URLs.

A Look at Other Threats’ Hidden Messages

Nemty isn’t the only threat with hidden messages in its code. In December 2015, for instance, Emsisoft analyzed a variant of Radamant ransomware and found that the executables and domain names for the threat’s command-and-control (C&C) servers used strings that expressed displeasure toward the security firm.

Just a few months after in June 2016, the antivirus provider came across a sample of Apocalypse directing insults at its research team. That’s around the same time that Bleeping Computer reported on a sample of Black Shades Crypter ransomware that used hidden messages to taunt security researchers who might be analyzing it.

How to Defend Against Nemty Ransomware

Security professionals can bolster enterprise defenses against threats like Nemty ransomware by developing an incident response plan and practicing it ahead of real attacks. Organizations should also continue to focus on user education by investing in a security awareness training program that helps employees learn about phishing attacks, ransomware and other threats.


UPDATE: Researchers at Tesorion took a close look at Nemty and noticed a few crucial deviations in the threat’s implementation of the AES-CBC encryption algorithm. Using those deviations, the researchers developed a process that allows victims in some cases to recover their affected files for free.

More from

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today