Ransomware, Threat Intelligence
ALPHV/BlackCat ransomware deployed by new Nitrogen malware
Share
North American technology and non-profit organizations have been targeted by the novel Nitrogen initial access malware campaign, which leverages web search ads of fake software websites to facilitate the delivery of ALPHV/BlackCat ransomware, BleepingComputer reports.
Threat actors behind the campaign have been using Google or Bing search results for widely used software, including AnyDesk, Cisco AnyConnect, WinSCP, and TreeSize Free, to lure potential victims into visiting fraudulent sites that feature trojanized ISO installers, which sideloads a malicious DLL file that later installs the Nitrogen malware, according to a Sophos report. Further analysis of the NitrogenInstaller revealed the presence of the "Python" registry key for persistence and the execution of "NitrogenStager," which establishes command-and-control server communications and deploys Cobalt Strike beacons and a Meterpreter shell.
While Sophos researchers have not determined the goal of the attackers behind the campaign, Trend Micro researchers previously noted the use of a similar attack chain to facilitate ALPHV/BlackCat ransomware delivery.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Related Terms
Account HarvestingBusiness Email Compromise (BEC)DNS SpoofingDeauthentication AttackDeepfakeDefacementDistributed ScansDumpSecDumpster DivingInformation WarfareGet daily email updates
SC Media's daily must-read of the most current and pressing daily news