Press "Enter" to skip to content

Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware

Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware

Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that’s deliberately designed to corrupt data and “inflict impeccable damage” to compromised systems.

Distributed through another malware loader known as SmokeLoader, the malware has been described as an “effective, fast, and unfortunately unrecoverable data wiper,” by Israeli cybersecurity company Check Point. Its origins have yet to be determined.

Using a method called intermittent encryption, the wiper routine is programmed to overwrite a file’s contents in alternating 666-byte chunks with random noise. This is a tactic increasingly used by ransomware operators to avoid detection and encrypt victims’ files more quickly.

- CyberInformer_Sticky RightBanner 300x600 high cpm *

ALSO, READ Researchers Uncover Stealthy Techniques Used By Cranefly Espionage Hackers

CyberSecurity

“One thing that sets Azov apart from your garden-variety ransomware is its modification of certain 64-bit executables to execute its own code,” threat researcher Jiří Vinopal said. “The modification of executables is done using polymorphic code, so as not to be potentially foiled by static signatures.”

Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware

Azov Ransomware also incorporates a logic bomb – a set of conditions that should be met before activating a malicious action – to detonate the execution of the wiping and backdooring functions at a predetermined time.

Destructive Azov Ransomware

“Although the Azov sample was considered skidsware when first encountered […], when probed further one finds very advanced techniques — manually crafted assembly, injecting payloads into executables in order to backdoor them, and several anti-analysis tricks usually reserved for security textbooks or high-profile brand-name cybercrime tools,” Vinopal added.

ALSO, READ Hackers Sign Android Malware Apps with Compromised Platform Certificates

The development comes amid a profusion of destructive wiper attacks since the start of the year. This includes WhisperGate, HermeticWiper, AcidRain, IsaacWiper, CaddyWiper, Industroyer2, DoubleZero, RURansom, and CryWiper.

Last week, security firm ESET disclosed another previously unseen wiper called Fantasy that’s spread using a supply chain attack targeting an Israeli software company to target customers in the diamond industry. The malware has been linked to a threat actor called Agrius.


CYBERINFORMER.NET –  brings updates on the latest cyber security tips, online safety tips and cyber information, cyber security courses for Nigerians and Foreigners, Cyber security jobs for seekers and much more.

If You find this article helpful please subscribe, like adn share.

Be First to Comment

Leave a Reply

Mission News Theme by Compete Themes.
%d bloggers like this: