November 18, 2019 By David Bisson 3 min read

Last week in security news, researchers observed the new PureLocker ransomware family using some unusual techniques to target enterprise production servers. Ransomware wasn’t the only type of malware that made headlines last week. A PowerShell-based script, a new backdoor and an info-stealing Trojan also generated attention in the security community for using interesting tactics and staging new attack campaigns.

Top Story of the Week: PureLocker’s Unique Tactics

Intezer and IBM X-Force Incident Response and Intelligence Services (IRIS) first came across PureLocker when they detected a sample masquerading as a C++ cryptography library called Crypto++. Further analysis revealed that the sample actually belonged to a ransomware family written in the PureBasic programming language, hence the name PureLocker.

Researchers observed the ransomware using two unusual techniques in its efforts to exclusively target enterprises’ production servers. First, they noticed PureLocker using several checks to verify the nature of its execution, a tactic that suggests the ransomware might be functioning as a component of a multi-stage attack. Second, they noticed the sample using anti-evasion tactics that other ransomware families rarely employ.

Source: iStock

Also in Security News

  • Mortality Rate From Heart Attacks Increased at Hospitals Following Data Breaches: An academic study found that the time until patients suffering from cardiovascular issues received a cardiogram grew by 2.7 minutes at hospitals that suffered a data breach. The mortality rate for these patients also increased 0.36 percent for three years following the security incident.
  • Mobile Users Urged to Be on the Lookout for Fleeceware: Kaspersky Lab noted that digital fraudsters are targeting mobile users with fleeceware, apps that charged high subscription fees to users even after they uninstalled them from their devices. These apps aren’t considered malware, however, in that they don’t perform malicious activity or request unusual permissions.
  • New Titanium Backdoor Used by Platinum Group to Target APAC Region: Detected by Kaspersky Lab, the Platinum Group launched a campaign that used encryption and fileless techniques to target South and Southeast Asian companies. Each step of the attack mimicked the activity of known software to ultimately load the Titanium backdoor.
  • Over Half of Q3 2019 DDoS Attacks Occurred in September: In its report findings published on Securelist, Kaspersky Lab revealed that September accounted for 53 percent of all distributed denial-of-service (DDoS) attacks that occurred in the third quarter of the year. Interestingly, 60 percent of all DDoS attacks in the early fall targeted education-related resources.
  • Glimpse Malware Capable of Using Alternative DNS to Evade Detection: IronNet found that Glimpse malware is capable of using text mode as an alternative Domain Name System (DNS) instead of relying on existing .NET DNS libraries. This technique makes it easier for the threat to evade detection by IT security teams.
  • Scam Uses Fake Bitcoin Private Key Generator to Spread Predator the Thief: Bleeping Computer learned of a scam campaign using YouTube videos to advertise a tool that claimed it could generate the private key of a bitcoin address, thereby helping users to steal other people’s funds. In reality, this tool infected users with Predator the Thief information-stealing malware.
  • New Pipka JavaScript Skimmer Targeting E-Commerce Merchants: In September 2019, Visa Payment Fraud Disruption found a new JavaScript-based skimmer infiltrating the payment forms of e-commerce merchants’ websites. Researchers found that the malware, named Pipka, removes itself from the HTML code of a compromised site, thereby increasing the likelihood that it’ll evade detection.
  • AnteFrigus Ransomware Not Targeting the C: Drive: In mid-November, Bleeping Computer learned of a malvertising campaign that’s using the RIG exploit kit to distribute samples of a new ransomware family called AnteFrigus. The threat differs from most ransomware families in that it targets removable drives and mapped network drives instead of the C: drive.
  • Growth in Number of Look-Alike Domains More Than Doubled in a Year: Researchers at Venafi found that the number of look-alike domains more than doubled between 2018 and 2019. Many of those domains targeted major retailers and used TLS certificates to lure users into a false sense of security.

Security Tip of the Week: Defend Against a Ransomware Attack

Security professionals can help their organizations prevent a ransomware infection by embracing the philosophy of threat hunting and using ethical hackers who can help identify gaps in their defenses. Companies should also make sure to implement a robust data backup strategy and test these backups so they can recover from a ransomware attack should they suffer one.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today