Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New Virobot Ransomware and Botnet Emerges

A newly discovered piece of malware combines ransomware and botnet capabilities in a single package, Trend Micro security researchers reveal.

A newly discovered piece of malware combines ransomware and botnet capabilities in a single package, Trend Micro security researchers reveal.

Dubbed Virobot, the threat not only encrypts files on infected machines, but it also ensnares the system into a spam botnet and leverages it to spread itself to other victims.

First discovered on September 17, 2018, Virobot checks compromised machines for the presence of specific registry keys to determine if the system should be encrypted.

The ransomware uses a cryptographic Random Number Generator to generate the encryption and decryption key, which is then sent along with machine-gathered data to the command and control (C&C) server via POST.

For encryption, the malware targets file types such as .txt, .docx, .xlsx, .pptx, .jpg, .png, .csv, .sql, .mdb, .php, .asp, .xml, .psd, .odt, and .html, among others.

Once the encryption process has been completed, the malware displays a ransom note and a ransom screen. The ransom note is written in French, but the malware is currently affecting users in the United States, Trend Micro reveals.

The malware’s server has been taken down, meaning that it can no longer encrypt files, as it requires communication with the C&C to do so.

Virobot, the security researchers discovered, also includes a keylogging feature. Logged key strokes from the infected machine are then sent to the C&C. Once connected to the server, the malware may also download files such as malware binaries, and execute them using PowerShell.

The botnet capabilities Virobot has been packed with include the use of an infected machine’s Microsoft Outlook to send spam emails to the user’s contact list. The malware sends either a copy of itself or a malicious payload downloaded from the C&C server.

“Individuals and enterprises should use a multi-layered approach to mitigate the risks brought by threats like ransomware,” Trend Micro said.

Related: New Python-based Ransomware Poses as Locky

Related: GandCrab: The New King of Ransomware?

Related‘RedEye’ Ransomware Destroys Files, Rewrites MBR

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.

Cybercrime

Security researchers with Juniper Networks’ Threat Labs warn of a new Python-based backdoor targeting VMware ESXi virtualization servers.