Skip to main content

New Java Based Ransomware Attack Windows & Linux Users

Tycoon Ransomware – New Java Based Ransomware Attack Windows & Linux Users


Tycoon%2BRansomware%2B%25281%2529

Security experts have warned that hackers are using a new multi-platform Java ransomware “Tycoon” to target Windows and Linux users to lock down the files.

We all know that hackers are constantly looking for new means to attack data centers and systems of normal users to steal essential data and information.

Since Microsoft Windows is the most used OS, that’s why hackers are making it as their target. hackers are paying more and more attention to other operating systems as well, like macOS and Linux. 

As hackers are betting massively on multi-platform malware and ransomware, that affects all the major platforms. The main goal of this critical vulnerability is to infect the SMBs in the software and education industries.

Tycoon Ransomware

Security experts at BlackBerry Research and Intelligence Team in association with KPMG’s UK Cyber ​​Response Services have named this ransomware as “Tycoon,” and it has been in operation since the end of 2019.

Here the main feature of Tycoon Ransomware is infecting all Windows and Linux users equally since it is a ransomware that is written in Java programming language.

Hackers hide the Tycoon inside a modified ZIP file that executes the trojan when the victim opens it. They commonly use the RDP server and vulnerable networks to sneak into the systems.

Once the hacker managed to run the ransomware on the victim’s system, it starts gaining persistence on the system, and to do this, it performs an IFEO (Image file execution options) injection in the Windows on-screen keyboard function.

It also changes the Active Directory password as well and disables the antivirus and then installs the ProcessHacker hacker-as-a-service utility tool.

After completing all these steps, the ransomware begins to encrypt all the data present on the computer and on the network drives.

TC%2B1


Once everything is done, it automatically sends the private key to the hacker securely, then it destroys the private key from the victim’s system, and finally, it displays the surprise message to the victim.

The files that get encrypted with the Tycoon ransomware end up with two extensions, that were not seen so far, “.grinch and .thanos.”

TC%2B2


Initially, the security researchers at BlackBerry has detected the ransomware after a hacker attacked a network of a European educational institute. Here, the attacker accessed the network through an Internet-connected RDP jump server and deployed a persistent backdoor.

Here, the security experts justified that the hacker left the backdoor on the vulnerable servers, and then after seven days, the hacker again re-entered into the network of the institute through the back door.

TC%2B3


Moreover, the security researchers point out that this form of attack is not common, since, in addition to being encoded in Java, the attackers use the Java image file (JIMAGE) located at lib\modules within the build directory to hide the malicious payload.

According to the security researchers, Tycoon ransomware is being deployed in an active ransomware attack campaign, using the highly targeted distribution mechanisms to infiltrate SMBs (small and medium-sized businesses), education institutions, and software industries, as here they can gain substantial amounts of money as ransom.

Protection and mitigation

To protect ourselves from this type of malware and ransomware, we should always have a backup of our most important files. It is imperative to keep our operating system and all the installed programs updated.

Apart from this, you have to keep installed a good antivirus for Windows or Linux, whatever the OS you are using. Not only that, but even you should also have to be careful while downloading any files from the internet by default, as most of them contain malware.

Here are the files extensions and signatures used by the attackers mentioned below.

Encrypted Files Extension:-

  • thanos
  • grinch
  • redrum

Encrypted Files Signature:-

  • happyny3.1
  • redrum3_0

So, what do you think about this? Share all your views and thoughts in the comment section below.

Comments

Most Popular Cyber News

Google Task Mate 100% Working Invitation Referral Code – Activate Task Mate Account (Easy Steps)

  Valid and 100% Working Referral Code for Google Task Mate (Beta) Early Access/ Testers : Google India has Launched Task Mate App on 19 November 2020 for the Indian user where you can Earn Money by finding task nearby, complete task i.e. Photo Upload, Record Sentence, Translate Sentences, Check shop details, upload video, etc. As the Task Mate is available to users in Beta Early Access only and for that, you have to enter a valid Invitation Referral Code. Here, Our Website Group (WhatsApp, Telegram and Twitter) Group and Channel are providing valid Referral Codes. Task Mate Beta is currently only available through invitation. Please enter the invitation or referral code below. TaskMate App – Complete Task to Earn Money Article About Valid Invitation Code of Task Mate (Referral Code) Company Google India App Task Mate (Early Access) Version Beta (Early Access) Invitation/ Referral Code Required Validity of Code Only for 100 Users per Invitation Code Website http://www.google.com/ V...

Microsoft’s Windows XP operating system (and other versions) source code has been leaked online

  The source code for Microsoft’s Windows XP operating system (and other versions) has been leaked online!  Published as a torrent file on bulletin board website 4chan, the 43GB data dump is said to have been compiled over the course of the last few months by the leaker. The collection also includes source code for Windows 2000 and multiple versions of Windows CE, MS DOS, Windows Embedded and Windows NT - but all of which have a smaller modern install base than XP. The individual responsible for the leak also appears to bear Bill Gates a distinct grudge, dedicating a whole section of the torrent file to videos slandering the Microsoft founder.  The legitimacy of the leaked code has not yet been confirmed, but Microsoft has been made aware of the issue. Although support for Windows XP lapsed in 2014 - meaning the OS has not received security updates for a number of years - a surprising number of users remain loyal to the outdated operating system. As of last month, 1.26% o...

GTA 5 release - How to download for free

Epic Games Store confirms GTA 5 release - How to download for free GTA is one of the most popular games in the gaming community and is played by thousands of players around the world. Epic Games' Twitter account accidentally tweeted out the promotional picture, confirming rumors of the game being available for free. GTA 5 will be available for free on the Epic Games store (Image Credits: Take-Two Interactive) An accidental leak by Epic Games' Twitter account inadvertently confirmed that GTA 5 would be available on the Epic Games store till the 21st of May for free. The release date is expected to be the 15th of May 2020. The Epic Games and GTA 5 collaboration comes as no surprise, considering the numerous rumors that had been doing the rounds regarding the same. Gamepressure.com  was one the first to receive a tip from an anonymous source and their website stated, "The free edition of GTA V will release as Premium Edition. In addition to the game itself and access to Grand...