Jump to content
  • Mysterious ransomware payment traced to a sensual massage site

    Karlston

    • 454 views
    • 4 minutes
     Share


    • 454 views
    • 4 minutes

    Mysterious ransomware payment traced to a sensual massage site

     

    A ransomware targeting an Israeli company has led researchers to track a portion of a ransom payment to a website promoting sensual massages.

     

    The attack was conducted by a more recent ransomware operation known as Ever101 who compromised an Israeli computer farm and proceeded to encrypt its devices.

     

    In a new report by Israeli cybersecurity firms Profero and Security Joes, who performed incident response on the attack, the Ever101 is believed to be a variant of the Everbe or Paymen45 ransomware.

     

    When encrypting files, the ransomware will append the .ever101 extension and drop a ransom note named !=READMY=!.txt in each folder on the computer.

    Example Ever101 ransom note
    Example Ever101 ransom note

    While investigating one of the infected machines, the researchers found a 'Music' folder that contained various tools used during the attack, providing insight into the threat actor's tactics, techniques, and procedures.

     

    "During our investigation of the infected machines, we came across what seemed to be a treasure trove of information stored in the Music folder. It consisted of the ransomware binary itself, along with several other files—some encrypted, some not—that we believe the threat actors used to gather intelligence and propagate through the network," explains Profero's and Security Joe's report.

     

    The known tools used by the Ever101 gang include:

     

    • xDedicLogCleaner - Cleans all Windows event logs, system logs, and the temp folder.
    • PH64.exe - 64-bit version of the Process Hacker program.
    • Cobalt Strike - The threat actors deployed cobalt Strike to provide remote access to machines and perform surveillance on the network. In this particular attack, the Cobalt Strike beacon was embedded in a WEXTRACT.exe file with an expired Microsoft signature.
    • SystemBC - SystemBC was used to proxy Cobalt Strike traffic through SOCKS5 proxy to avoid detection.

     

    Other tools were also found but were encrypted by the ransomware. Based on the names and other characteristics, the researchers believe the ransomware gang used the following tools as well:

     

    • SoftPerfect Network Scanner - An IPv4/IPv6 network scanner.
    • shadow.bat - Likely a batch file used to clear Shadow Volume Copies from the Windows device.
    • NetworkShare_pre2.exe - Enumerates a Windows network for shared folders and drives.

     

    Of interest is that some of the files shared by the attackers, such as WinRar, were localized in Arabic.

    WinRar with Arabic localization
    WinRar with Arabic localization

    Profero CEO Omri Moyal told BleepingComputer that he believes the Arabic localization to some of these tools is a "false flag."

    Following the money to a sensual massage

    Of particular interest is what the researchers discovered after they used CipherTrace to track the ransom payment as it flowed through different bitcoin wallets.

     

    While tracing the payment, they found a small portion, 0.01378880 BTC or approximately $590, was sent to a 'Tip Jar' on the RubRatings site.

     

    RubRatings is a website that allows "massage and body rub providers" in the USA to advertise their services, many of them offering sensual massages and showing barely nude pictures.

     

    Each masseuse profile includes a Tip Jar button that allows customers to leave a bitcoin tip for their recent massage.

    RubRatings Bitcoin Tip Jar
    RubRatings Bitcoin Tip Jar

    The researchers believe that some of the ransom payment went to an Ever101 operative in the USA, who then used the coins to tip a masseuse, or more likely, use the site as a way to launder the ransom payment.

     

    "The second possibility is that the provider on the site was used as another method of obfuscating the bitcoin movement," the researchers explain. "It could be that the provider who possesses the bitcoin wallet in question was working with the threat actor(s), but more likely, it is a fake account set up to enable money transfers." 

     

    "The bitcoin in the wallet linked to RubRatings received the payment around 15:48 UTC, and it left the wallet just a few minutes later, at 15:51 UTC."

     

    As bitcoin is becoming more easily traced, and even recovered by law enforcement, ransomware operations are looking for novel approaches to launder their ill-gotten gains.

     

    It is likely that the threat actors created a fake account on RubRatings and were using the Tip Jar feature as a way to launder the ransom by making it look like a tip to a masseuse.

     

     

    Mysterious ransomware payment traced to a sensual massage site


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...