Security Experts:

Connect with us

Hi, what are you looking for?



New Ransomware ‘Diavol’ Linked to Notorious Cybercrime Gang

Wizard Spider, the notorious cybercrime gang that operated the TrickBot botnet and the Ryuk and Conti

Wizard Spider, the notorious cybercrime gang that operated the TrickBot botnet and the Ryuk and Conti ransomware families, may have developed a new ransomware family, Fortinet reports.

Dubbed Diavol, the ransomware shows similarities with Conti, but the observed attacks lack some of the tactics previously associated with Wizard Spider.

On the infected machines, the ransomware drops a text ransom note in each folder, informing victims that data was exfiltrated and threatening public exposure if payment is not made.

Fortinet’s security researchers, however, say that none of the Diavol samples they observed so far has data stealing capabilities, but don’t exclude the possibility that the function will be added with a future update.

Compiled with Microsoft Visual C/C++ Compiler, Diavol uses user-mode Asynchronous Procedure Calls (APCs) for encryption, which is much slower compared to symmetric algorithms. Once executed, the malware starts checking for command line arguments to scan for specific files or folders and encrypt local partitions or network shares.

The ransomware keeps its main routines in bitmap images that are stored in the PE resource section, with a total of 14 routines identified, including one that instructs Diavol to stop services and processes and another to delete shadow copies.

As part of an observed attack, Diavol was deployed in conjunction with Conti, albeit on different machines. The two use nearly identical command-line parameters and the same functionality and both operate with asynchronous I/O operations when queuing files for encryption, suggesting a close connection between them.

Despite the attack being attributed to Wizard Spider, Fortinet also noticed some differences between Diavol and Conti, such as the lack of checks to ensure the malware doesn’t infect Russian victims and no clear evidence of double extortion.

The researchers also noticed similarities between Diavol’s ransom note and that of Egregor ransomware, which is operated by Twisted Spider. Although the gang is reportedly linked to Wizard Spider, the two are believed to conduct their own, separate operations.

“Currently, the source of the intrusion is unknown. The parameters used by the attackers, along with the errors in the hardcoded configuration, hint to the fact that Diavol is a new tool in the arsenal of its operators which they are not yet fully accustomed to,” Fortinet says.

Related: Ryuk Ransomware With Worm-Like Capabilities Spotted in the Wild

Related: Green Energy Company Volue Hit by Ransomware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...


The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.