Connect with us

Hi, what are you looking for?

Cyber Security

New Azov data wiper tries to frame researchers and BleepingComputer

A new and destructive ‘Azov Ransomware’ data wiper is being heavily distributed through pirated software, key generators, and adware bundles, trying to frame well-known security researchers by claiming they are behind the attack.

The Azov Ransomware falsely claims to have been created by a well-known security researcher named Hasherazade and lists other researchers, myself, and BleepingComputer, as involved in the operation.

The ransom note, named RESTORE_FILES.txt, says that devices are encrypted in protest of the seizure of Crimea and because Western countries are not doing enough to help Ukraine in their war against Russia.

'Azov Ransomware' data wiper note to victims
‘Azov Ransomware’ data wiper note to victims
Source: BleepingComputer

The ransom note tells victims to contact me, BleepingComputer, Hasherazade, MalwareHunterTeam, Michael Gillespie, or Vitali Kremez on Twitter to recover files, falsely implying that we are part of the ransomware operation.

To be clear, those listed in the ransom note are not associated with this ransomware and are being framed by the threat actor. Therefore, we, unfortunately, do not have the decryption keys and cannot help.

Furthermore, as there is no way to contact the threat actors to pay a ransom, this malware should be treated as a destructive data wiper rather than ransomware.

Unfortunately, victims have already started contacting BleepingComputer for help recovering files, and as much as we would like to help, there is no known way of helping at this time.

While the threat actors claim they are doing this in support of Ukraine, BleepingComputer knows of a Ukrainian organization affected by this data wiper.

The wiper takes its name from the Ukrainian Azov Regiment, a controversial military force that allegedly associated with neo-Nazi ideology in the past.

This is not the first time threat actors attempted to frame security researchers for their malware.

In 2016, the Apocalypse ransomware operation renamed one of its variants to Fabiansomware after Fabian Wosar. In 2020, one of the Maze ransomware developers released an MBR Locker, claiming it was made by Vital Kremez.

What we know about the Azov wiper

In a new campaign started over the past two days, a threat actor appears to have purchased ‘installs’ through the SmokeLoader malware botnet to deliver the new destructive Azov wiper.

https://twitter.com/malwrhunterteam/status/1586713979514224643?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1586713979514224643%7Ctwgr%5E962dfb66d1565767742f0c8bd92776d684d3d44e%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fnew-azov-data-wiper-tries-to-frame-researchers-and-bleepingcomputer%2F

SmokeLoader is a malware botnet that other threat actors can rent or buy ‘installs,’ to distribute their own malware on infected devices. SmokeLoader is commonly distributed through websites pushing fake software cracks, game modifications, cheats, and key generators.

Over the past few days, SmokeLoader has begun delivering the new ‘Azov Ransomware,’ along with other malware [VirusTotal], such as the RedLine Stealer information-stealing malware and the STOP ransomware.

BleepingComputer is aware of victims being double-encrypted, first with Azov and then with STOP ransomware, as SmokeLoader delivered both simultaneously.

The initial ransomware executable [VirusTotal] will be dropped under a random file in the Windows temp (%Temp%) folder and executed.

Advertisement. Scroll to continue reading.

Once launched, the wiper will copy C:\Windows\System32\msiexec.exe to C:\ProgramData\rdpclient.exe [VirusTotal] and patch it to also contain the Azov wiper. Additionally, the wiper may be configured to launch when Windows starts using the following Registry key.

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\]
“Bandera” = “C:\ProgramData\rdpclient.exe”

The wiper will now scan all the drives on the computer and encrypt any file that does not have the .ini.dll, and .exe extensions.

When encrypting files, it will append the .azov file extension to the names of encrypted files. For example, 1.doc is encrypted and renamed to 1.doc.azov, as shown below.

Files encrypted by the 'Azov Ransomware' data wiper
Files encrypted by the ‘Azov Ransomware’ data wiper
Source: BleepingComputer

In each folder that is scanned for files, the wiper will create text files named RESTORE_FILES.txt that contain a message from the threat actor, as shown previously in the article.

A previous version of the wiper found by MalwareHunterTeam used a different ransom note with a much darker message.

Message from an older version of the Azov data wiper
Message from an older version of the Azov data wiper
Source: BleepingComputer

While the ransomware will be analyzed by researchers for weaknesses in the encryption, at this time, the ransomware should be considered destructive, as there is no way to contact the threat actors and recover decryption keys.

We will update this article if a method is discovered to recover files for free.

However, if this data wiper encrypted your data, you were likely also infected with other malware, such as information-stealing trojans.

Therefore, you should immediately change the passwords on your online accounts, especially those sensitive in nature, such as online banking, password managers, and email accounts.

Copyright 2021 Associated Press. All rights reserved.

Source: https://www.bleepingcomputer.com/news/security/new-azov-data-wiper-tries-to-frame-researchers-and-bleepingcomputer/

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Business News

Tyligulska Wind Power Plant, located to the west of Kherson, is the world’s only windfarm to be built in a major conflict zone. Lucy...

Cyber Security

The Spanish National Police has apprehended a Ukrainian national wanted internationally for his involvement in a scareware operation spanning from 2006 to 2011. This...

Business News

After Russia’s most serious political crisis in decades, uncertainty swirled Monday about the fate of the former Putin ally who led a brief armed rebellion, his...

Business News

FILE – Wagner Group head Yevgeny Prigozhin attends the funeral of Dmitry Menshikov, a fighter of the Wagner group who died during a special...

Copyright © 2023 Newsworthy News | Global | Political | Local | All News | Website By: Top Search SEO