Maze ransomware criminals go virtual to evade detection

By
Follow google news

Close to 2 gigabyte virtual disk image hides payload.

Frustrated by having their attacks thwarted for days, the Maze ransomware criminals resorted to using a virtual machine to get around endpoint protection, security vendor Sophos said.

Maze ransomware criminals go virtual to evade detection

Sophos investigated an attack by Maze that took place in July this year in which the ransomware criminals had penetrated a victim's network six days before trying to executing the file encryption payload.

The Maze gang mapped out the target network via a domain controller and succeeded in exfiltrating data to cloud storage provider Mega.nz and demanded a US$15 million (A$20.5 million) ransom.

However, the ransom was not paid and two efforts by Maze to execute the ransomware were quarantined and failed, Sophos researchers said.

Borrowing a technique from the earlier Ragnar Locker criminals, Maze put its ransomware payload inside an Oracle VirtualBox virtual machine to hide it from detection.

The .msi installer file Maze used weighs in at 733 megabytes as it uses Windows 7, compared to just 122 MB for Ragnar Locker's Windows XP-based malware delivery set-up.

Expanded, the virtual machine Maze used was 1.9 gigabytes in size, and contained a 494 KB ransomware executable.

Despite the elaborate subterfuge employed by Maze, the virtual machine-based ransomware attack was detected and failed.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Australia's big end of town is paying ransomware groups

Australia's big end of town is paying ransomware groups

Seven years' prison for Australian who sold zero-days to Russia

Seven years' prison for Australian who sold zero-days to Russia

ASD releases Azul open-source malware analysis tool

ASD releases Azul open-source malware analysis tool

Log In

  |  Forgot your password?