Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Albabat Ransomware Expands Targets, Abuses GitHub

New versions of the Albabat ransomware target Windows, Linux, and macOS, and retrieve configuration files from GitHub.

Newly identified versions of the Albabat ransomware are configured to target all major desktop platforms and to retrieve components from GitHub, cybersecurity firm Trend Micro reports.

Active since 2023 and also known as White Bat, Albabat is known for targeting Windows systems through fake activation tools and cheat software, but the first signs of potential expansion to other platforms were seen in early 2024.

In January last year, after noticing that the desktop wallpaper that Albabat was dropping on infected systems was mentioning Linux, Fortinet warned that the Rust-written ransomware could be cross-compiled to target more operating systems.

Now, Trend Micro reports that the most recent in-the-wild samples of the ransomware can harvest information from Linux and macOS systems, and that their configuration files include commands for these platforms.

Albabat retrieves its configuration files and other components from a private GitHub repository accessible through an authentication token, which is registered under the name Bill Borguiann. The repository was created in February 2024 and last updated in February 2025.

“These new versions retrieve their configuration data through the GitHub REST API using a ‘User-Agent’ string labelled ‘Awesome App’. The configuration provides key details about the ransomware’s behavior and operational parameters,” Trend Micro explains.

The configuration files reveal that the ransomware ignores dozens of folders when encrypting files, that it targets a broad range of file extensions, and that it attempts to kill numerous processes that might interfere with its operations.

In addition to encrypting the victim’s files, Albabat steals data from the machine, storing the collected information in a remote PostgreSQL database.

Advertisement. Scroll to continue reading.

“The ransomware uses a database to track infections and payments. This collected information helps attackers to make ransom demands, monitor infections, and sell victims’ data,” Trend Micro explains.

The cybersecurity firm warns that the ransomware is under active development, with some configuration files in its GitHub repository mentioning version 2.5, while the samples found in the wild being version 2.0.

Related: Ransomware Group Claims Attack on Virginia Attorney General’s Office

Related: Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover

Related: LockBit Ransomware Developer Extradited to US

Related: Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.