Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Users Warned of New Aerst, ScareCrow, and Vohuk Ransomware Families

Fortinet’s security researchers have shared information on three new ransomware families named Aerst, ScareCrow, and Vohuk.

Fortinet’s security researchers have shared information on three new ransomware families named Aerst, ScareCrow, and Vohuk.

Targeting Windows computers, these are typical ransomware families that encrypt victim files and demand a ransom payment in exchange for a decryption key. This new ransomware has been used in an increasing number of attacks.

Aerst was seen appending to encrypted files the ‘.aerst’ extension and displaying a popup window containing the attacker’s email address, instead of dropping a typical ransom note.

The popup window contains a field where the victim can enter a purchase key required to restore the encrypted data. Aerst deletes Volume Shadow copies to prevent file recovery.

Vohuk does drop a ransom note – readme.txt – asking the victim to contact the attackers via email. Seemingly under continuous development, the malware assigns a unique ID to each victim.

This ransomware family appends the ‘.vohuk’ extension to the encrypted files, replaces file icons with a red lock icon, and changes the desktop wallpaper with its own.

“The ransomware leaves a distinctive mutex, ‘GlobalVohukMutex’, which prevents different instances of Vohuk ransomware from running on the same system,” Fortinet explains.

The malware has been mainly targeting users in Germany and India.

Advertisement. Scroll to continue reading.

ScareCrow’s ransom note, named ‘readme.txt’, instructs victims to contact the attacker using one of three Telegram channels. The threat appears to be the most widespread, with files submitted from the United States, Germany, India, Italy, the Philippines, and Russia.

Fortinet has identified some similarities between ScareCrow and Conti, such as the use of the CHACHA algorithm for encryption, and the use of the WMI command-line utility to delete Volume Shadow copies, which suggest that ScareCrow’s developers might have used Conti source code leaked earlier this year.

The ransomware’s developer has encrypted each command string in the malware, including DLL names, API names, and even command strings, with a different decryption routine. ScareCrow appends the ‘.crow’ extension to the encrypted files.

Related: Healthcare Organizations Warned of Royal Ransomware Attacks

Related: New Zealand Government Hit by Ransomware Attack on IT Provider

Related: Hive Ransomware Gang Hits 1,300 Businesses, Makes $100 Million

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.