Jump to content

This new ransomware is targeting Windows and Linux PCs with a 'unique' attack


Recommended Posts

Researchers detail the unusual workings of Tycoon ransomware - which appears to be designed to stay under the radar as much as possible.




A newly uncovered form of ransomware is going after Windows and Linux systems in what appears to be a targeted campaign.


Named Tycoon after references in the code, this ransomware has been active since December 2019 and looks to be the work of cyber criminals who are highly selective in their targeting. The malware also uses an uncommon deployment technique which helps stay hidden on compromised networks. 


The main targets of Tycoon are organisations in the education and software industries.



Tycoon has been uncovered and detailed by researchers at BlackBerry working with security analysts at KPMG. It's an unusual form of ransomware because it's written in Java, deployed as a trojanised Java Runtime Environment and is compiled in a Java image file (Jimage) to hide the malicious intentions.


"These are both unique methods. Java is very seldom used to write endpoint malware because it requires the Java Runtime Environment to be able to run the code. Image files are rarely used for malware attacks," Eric Milam, VP for research and intelligence at BlackBerry told ZDNet.


"Attackers are shifting towards uncommon programming languages and obscure data formats. Here, the attackers did not need to obscure their code were nonetheless successful in accomplishing their goals," he added.


However, the first stage of Tycoon ransomware attacks is less uncommon, with the initial intrusion coming via insecure internet-facing RDP servers. This is a common attack vector for malware campaigns and it often exploits servers with weak or previously compromised passwords.



Once inside the network, the attackers maintain persistence by using Image File Execution Options (IFEO) injection settings which more often provide developers with the ability to debug software. The attackers also use privileges to disable anti-malware software using ProcessHacker in order to stop removal of their attack.


"Ransomware can be implemented in high-level languages such as Java with no obfuscation and executed in unexpected ways," said Milam.


After execution, the ransomware encrypts the network with files encrypted by Tycoon given extensions including .redrum, .grinch and .thanos – and the attackers demand a ransom in exchange for the decryption key. The attackers ask for payment in bitcoin and claim the price depends on how quickly the victim gets in touch via email.


The fact the campaign is still ongoing suggests that those behind it are finding success extorting payments from victims.


Researchers suggest that Tycoon could potentially be linked to another form of ransomware, Dharma – also known as Crysis – due to similarities in the email addresses, names of encrypted files and the text of the ransom note. 


And while Tycoon does have some unique means of executing an infection, like other forms of ransomware, it's possible to prevent it from getting that far.


As RDP is a common means of compromise, organisations can ensure that the only ports facing outward to the internet are those which require it as an absolute necessity.


Organisations should also make sure that accounts which do need access to these ports aren't using default credentials or weak passwords which can easily be guessed as a means of breaking in.


Applying security patches when they're released can also prevent many ransomware attacks, as it stops criminals exploiting known vulnerabilities. Organisations should also ensure they regularly backup their network – and that the backup is reliable – so that if the worst happens, the network can be restored without giving into the demands of cyber criminals.



Link to comment
Share on other sites

  • Replies 1
  • Views 1.3k
  • Created
  • Last Reply

Beware of this new Tycoon ransomware targeting Windows PCs



FBI Internet Crime Complaint Center (IC3) last year published the “Internet Crime Report”. The report revealed that cybercrime had cost a massive $3.5 billion (£2.7 billion) in 2019. Attackers use ransomware to extract money from businesses and individual users. BlackBerry’s security research unit recently discovered a new ransomware that affected an European educational institute. Unlike most of the ransomware discovered till date, this new ransomware module is compiled into a Java image file format (JIMAGE). JIMAGE is a file format that stores custom JRE images which is designed to be used by the Java Virtual Machine (JVM) at runtime.


Here’s how the attack happened:

  • To achieve persistence on the victim’s machine, the attackers had used a technique called Image File Execution Options (IFEO) injection. IFEO settings are stored in the Windows registry. These settings give developers an option to debug their software through the attachment of a debugging application during the execution of a target application.
  • A backdoor was then executed alongside the Microsoft Windows On-Screen Keyboard (OSK) feature of the operating system.
  • The attackers disabled the organization’s anti-malware solution with the use of the ProcessHacker utility and changed the passwords for Active Directory servers. This leaves the victim unable to access their systems.
  • Most of the attacker files were timestomped, including the Java libraries and the execution script, and had file date timestamps of 11th April 2020, 15:16:22
  • Finally, the attackers executed the Java ransomware module, encrypting all file servers including backup systems that were connected to the network.

After extraction of the zip file associated with the ransomware, there are three modules in the name of “tycoon”. So, Blackberry team has named this ransomware as tycoon. Check out the ransom note of tycoon below.




You can find more details about this ransomware from the link below.


Source: Blackberry



Beware of this new Tycoon ransomware targeting Windows PCs



Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...