Newly emergent CatB ransomware has been leveraging DLL search order hijacking through Microsoft Distributed Transaction Coordinator to bypass security systems and facilitate payload deployment, The Hacker News reports.|
Believed to be an evolution of the Pandora ransomware attributed to Chinese cyberespionage operation Bronze Starlight, CatB ransomware features a dropper with anti-analysis checking capabilities that eventually exploits MSDTC to enable the injection of the oci.dll payload with the ransomware strain, according to a SentinelOne report.
The report also showed that CatB ransomware has the capability to exfiltrate browser-stored passwords, history, and bookmarks, as well as forgoes the traditional ransomware note in exchange of messages in encrypted files urging Bitcoin payments.
"CatB joins a long line of ransomware families that embrace semi-novel techniques and atypical behaviors such as appending notes to the head of files. These behaviors appear to be implemented in the interest of detection evasion and some level of anti-analysis trickery," said researcher Jim Walter.
Windows and Linux systems are being targeted by a new information-stealing malware peddled by the Cyclops ransomware operation, The Hacker News reports.
Officials at the City of Augusta, Georgia, have been noted by Mayor Garnett Johnson to have not communicated with the BlackByte ransomware operation that took credit for a cyberattack against the city that commenced on May 21, according to The Record, a news site by cybersecurity firm Recorded Future.
Attacks exploiting a zero-day in the MOVEit Transfer file transfer app to compromise various servers and facilitate data exfiltration efforts have been admitted by the Clop ransomware operation, also known as Lace Tempest, TA505, and FIN11, after the intrusions have been attributed to the group by Microsoft, reports BleepingComputer.