DarkSide ransomware targets hidden files in disk partitions
Colonial Pipeline hackers are behind this new strain
Security researchers have discovered that the hackers behind the Colonial Pipeline have developed a new strain of ransomware that targets disk partitions used to hide backup files.
With ransomware becoming more prevalent, administrators have hidden files on disks to prevent systems from being compromised. But according to Fortinet, the cyber criminal gang behind the DarkSide ransomware has developed a malware variant that looks for partitions on a multiboot system to find additional files to encrypt, thereby causing greater damage and an increased incentive to pay a ransom to recover files.
Researchers said this variant is not the version used to disrupt Colonial Pipeline operations. It was programmed efficiently with very little wasted space and minimal compiler bloat, which experts say is unusual for most malware. The file size is relatively small for malware (57,856 bytes) but can deliver a much larger than expected payload, warned researchers.
As well as looking for hidden partitions, the ransomware variant hunts for domain controllers within an organization and connects to its active directory via LDAP anonymous authentication, using a null password and a null username.
“This DarkSide variant may then use COM to interface with Active Directory itself. If successful, the malware attempts to delete certain variables, such as defaultNamingContext and dnsHostName,” said researchers.
Following a query of an organization’s Active Directory, the ransomware then attempts to encrypt files in network shares in this section of the code. Researchers noted that the variant avoids network shares named C$ and ADMIN$, as attempts to access them could trigger an alert.
RELATED RESOURCE
2021 state of email security report: Ransomware on the rise
Securing the enterprise in the COVID world
The variant also scans hard drives to carry out more actions. In this case, it scans the drive to see if it’s a multiboot system to find additional volumes/partitions to try and encrypt their files as well.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Researchers said the malware’s C2 servers were co-located in the US with KingServers B.V.
“KingServers has been classified as a bulletproof host by the infosec community, and although based in the Netherlands, it has ties to Russia, where DarkSide is located,” said researchers.
Researchers added that due to the sophistication of its attacks and code, it’s also unlikely the mastermind of one person.
“The level of detail, effort, planning and time that the group has undertaken, not only creating the ransomware itself, but taking the time to note what data was stolen, the amount of data, what it contained (as well as how much data in GB), and then taken to organize and shame victims all highlight that this is the work of an organization with considerable resources and time,” added researchers.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
-
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application
-
Volkswagen confirms security ‘incident’ amid ransomware breach claimsNews Volkswagen has confirmed a security "incident" has occurred, but insists no IT systems have been compromised.
-
The number of ransomware groups rockets as new, smaller players emergeNews The good news is that the number of victims remains steady
-
Teens arrested over nursery chain Kido hacknews The ransom attack caused widespread shock when the hackers published children's personal data
-
NCA confirms arrest after airport cyber disruptionNews Disruption is easing across Europe following the ransomware incident
-
Cyber professionals are losing sleep over late night attacksNews Hackers are biding their time and launching attacks when businesses can’t respond
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million rewardNews The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attackNews The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalitiesNews The attack on IT systems supplier Miljödata has impacted public sector services across the country
