Researchers at Denmark-based security firm CSIS have stumbled upon a new variant of Rovnix, a piece of malware that’s designed to download other threats onto infected machines.
The latest variant attracted the attention of researchers because of its new domain generation algorithm (DGA). The DGA appears to be generating domains based on words taken from the United States declaration of independence. Examples include accordinglytathdivine.com, operationlegislative.eu, governmentformsact.eu and overmartimeconstrains.cn.
The developers behind Rovnix have also made some changes to help the threat avoid detection.
“In the latest Rovnix variant, the author changed the protocol in order to avoid traffic detection by patterns. So now, it is generating a random file name, of which only the first letter is of importance. It can be one of the following three: “c” for config.php , “t” – for task.php and “d” – for data,” Peter Kruse of CSIS explained in a blog post. “Data is sent with a random generated value encoded by base64.”
The malware authors have also removed the bootkit component. Now, the threat only supports a user-mode component, Kruse said.
The security company has observed three campaigns involving the latest Rovnix, all of which are aimed at users in European Union countries, including Poland and Norway.
Unlike previous operations, the cybercriminals have now encrypted communications with the command and control (C&C) server.
Researchers have also noticed that the malware authors released a new C&C panel. The decision to rewrite the control panel was probably made after reports surfaced about a bug in the previous version, CSIS said.
In May, Microsoft reported that a new variant of Rovnix introduced a virtual file system (VFS) used to store the malware’s components and stolen data.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
