Security Experts:

Connect with us

Hi, what are you looking for?



Organizations Warned of New Lilith, RedAlert, 0mega Ransomware

Security researchers with threat intelligence firm Cyble have warned organizations about three new ransomware families named Lilith, RedAlert and 0mega.

Security researchers with threat intelligence firm Cyble have warned organizations about three new ransomware families named Lilith, RedAlert and 0mega.

Written in C/C++ and targeting 64-bit Windows systems, Lilith appends the “.lilith” extension to the encrypted files, after which it drops a ransom note on the system to demand a payment. The ransomware operators also steal victim data to perform double extortion.

The ransomware features a hardcoded list of processes that it searches for once it is executed on a victim’s machine, and terminates any of those found running, to ensure they would not block its access to the files targeted for encryption.

Targeted processes include those for Outlook, Thunderbird, Firefox, SQL, Steam, and more.

The ransomware also searches for services running on the system, by gaining access to the service control manager database, and then calls specific APIs to take control of target services and stop them, Cyble explains.

Next, Lilith enumerates the system’s drives and gathers information on each of them, after which it searches for files to encrypt by enumerating file directories on the machine.

Victim files are encrypted using a set of cryptographic APIs and a random key generated locally. The encrypted files feature the “.lilith” extension and are used to replace the original files on the disk.

It ignores files with the extensions EXE, DLL, and SYS, as well as a series of directories and file names, including the file that stores the local public key the Babuk ransomware would use for decryption, which might indicate a connection between the two ransomware families.

Before beginning the encryption process, the ransomware drops a ransom note in multiple folders. The note informs the victim they have three days to contact the ransomware operators and negotiate a payment.

Lilith ransomware ransom note

The threat actor also threatens to make the victim’s data public if the ransom is not paid before the deadline. The ransom note also includes a link to a Tor domain that the attackers use as their leak site.

Cyble also warns of an increase in attacks using two rather new ransomware families, namely RedAlert and 0mega. For 0mega, which employs the double-extortion tactic, indicators of compromise have yet to be published.

For the past weeks, RedAlert has been targeting Linux VMware ESXi servers, stopping all virtual machines and encrypting all files related to them. The malware is executed manually, supports multiple pre-encryption commands, and only accepts ransom payments in Monero.

“Ransomware groups continue to pose a severe threat to firms and individuals. Organizations need to stay ahead of the techniques used by threat actors besides implementing the requisite security best practices and security controls,” Cyble notes.

Related: Black Basta Ransomware Becomes Major Threat in Two Months

Related: Researchers Devise Attack Using IoT and IT to Deliver Ransomware Against OT

Related: New Malware Samples Indicate Return of REvil Ransomware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.


Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.