Go Back   Carder.life > [en] International Forum > Carding News



 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
  #1  
Old 03-10-2025, 09:46 PM

Artifact Artifact is offline
Administrator
Join Date: Jan 2024
Posts: 0
Default


A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024.
The attacks exploited CVE-2024-24919, a Check Point Security Gateway vulnerability, to gain access to targeted networks and deploy the ShadowPad and PlugX malware, two families tightly associated with Chinese state-sponsored threat groups.
Orange Cyberdefense CERT links the attacks to Chinese cyber-espionage tactics, though there's not enough evidence to attribute them to specific groups.
NailaoLocker details
Orange's researchers report that NailaoLocker is a relatively unsophisticated ransomware strain compared to the most prominent families in the space.
The reason why Orange sees NailaoLocker as a rather basic ransomware is that, it does not terminate security processes or running services, it lacks anti-debugging and sandbox evasion mechanisms, and does not scan network shares.
"Written in C++, NailaoLocker is relatively unsophisticated and poorly designed, seemingly not intended to guarantee full encryption," mentions Orange.
The malware is deployed on target systems via DLL sideloading (sensapi.dll) involving a legitimate and signed executable (usysdiag.exe).
The malware loader (NailaoLoader) verifies the environment by performing memory address checks and then decrypts the main payload (usysdiag.exe.dat) and loads it into memory.

Overview of the attack chain
Next, the NailaoLocker activates and begins encrypting files using an AES-256-CTR scheme, appending the ".locked" extension to encrypted files.
After the encryption is done, the ransomware drops an HTML ransom note with the very unusually long filename of "unlock_please_view_this_file_unlock_please_view_t his_file_unlock_please_view_this_file_unlock_pleas e_view_this_file_unlock_please_view_this_file_unlo ck_please_view_this_file_unlock_please.html."

NailaoLocker ransom note
This ransom note instructs the victims to contact them at a disposable ProtonMail address, which, in a few cases seen by BleepingComputer, was johncollinsy@proton[.]me.
The ransom note does not indicate that data was stolen, which is odd for most modern ransomware operations.
Espionage and ransomware combined
Investigating deeper, Orange says they found some overlap between the content of the ransom note and a ransomware tool sold by a cybercrime group named Kodex Softwares (formerly Evil Extractor). However, there were no direct code overlaps, making the connection blurry.
Orange has shared several hypotheses for the attacks, including false flag operations meant to distract, strategic data theft operations doubled with revenue generation, and, more likely, a Chinese cyberespionage group "moonlighting" on the side to earn some money.
Only last week,https://www.bleepingcomputer.com/new...omware-attack/ about suspected Emperor Dragonfly (a.k.a. Bronze Starlight) operatives deploying RA World ransomware against Asian software firms and demanding a ransom of $2 million.
Compared to North Korean actors who are known to pursue multiple goals in parallel, including financial gains via ransomware attacks, Chinese state-backed actors haven't followed this approach, so the shift in tactics is concerning.
https://www.bleepingcomputer.com/new...althcare-orgs/
 

Tags
NULL

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT. The time now is 05:40 AM.