• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Malware

Rorschach Ransomware Doubles Encryption Speeds: A New Threat in the Cybercrime Landscape

The new "Rorschach" ransomware, one of the most sophisticated ever seen, doubles known encryption speeds can devastate business in a minute.

Gert Van de VenbyGert Van de Ven
April 12, 2023
in Articles, Cybercrime, Malware
0
Rorschach Ransomware Doubles Encryption Speeds: A New Threat in the Cybercrime Landscape

Ransomware attacks have become increasingly prevalent in recent years, and cybercriminals are developing ever-more sophisticated techniques to encrypt computer systems and hold data hostage. The emergence of the “Rorschach” ransomware marks a significant leap forward in the evolution of these attacks, with the malware achieving encryption speeds twice as fast as the notorious LockBit 3.0 malware. This article will delve into the technical aspects of this malware and explore its potential impact on the wider cybersecurity landscape.

Agenda

  1. Ransomware Attacks: A Growing Threat
  2. The Emergence of “Rorschach” Ransomware
  3. Customizable and Highly Efficient Encryption Speeds
  4. Unique Features of “Rorschach” Ransomware
  5. Potential Impact on Businesses and Individuals
  6. Prevention and Mitigation Strategies
  7. Conclusion

Ransomware Attacks: A Growing Threat

Ransomware attacks have become one of the biggest cyber threats facing individuals and organizations alike. These attacks involve malware that encrypts important data and demands payment in exchange for the decryption key, effectively holding the victim’s data hostage. The cost of ransomware attacks is staggering, with estimates showing that these attacks cost businesses billions of dollars annually.

One of the reasons why ransomware attacks have become so prevalent is the rise of cryptocurrencies like Bitcoin. Bitcoin and other cryptocurrencies allow attackers to demand payment in a way that is anonymous and difficult to trace, making it easier for them to collect their ransom without being caught. This has led to an increase in the number of attackers using ransomware as a means of generating income.

In addition to the financial cost, ransomware attacks can also cause significant disruption and damage to an organization’s reputation. A successful attack can lead to data loss, system downtime, and other costly consequences. As such, it is critical that individuals and organizations take steps to protect themselves against ransomware attacks, including implementing strong security protocols and regularly backing up their data.

The Emergence of “Rorschach” Ransomware

The Rorschach ransomware is a newly discovered malware strain that has doubled known encryption speeds, locking up systems at nearly twice the speed of the notorious LockBit 3.0 ransomware. Researchers at Check Point Research (CPR) conducted speed tests, which revealed that Rorschach could encrypt 220,000 local drive files in just four and a half minutes. By adjusting the number of encryption threads via the command line argument, the ransomware can achieve even faster times. What makes Rorschach more concerning is that it has highly customizable features, making it a potent weapon in the hands of attackers.

Another aspect that makes Rorschach unique is that it contains elements from multiple ransomware strains, including Babuk, DarkSide, Yanluowang, and LockBit 2.0. The malware employs a hybrid-cryptography scheme that underpins its impressive encryption speeds. It also autonomously carries out tasks that are usually manual in ransomware strains, such as creating a domain group policy, and uses ransom notes that borrow heavily from previous ransomware families. While Rorschach borrows from other malware strains, it also adds its own unique coding elements. For instance, it uses direct syscalls to silently inject malicious code into other processes, making it much more difficult to detect.

Rorschach’s partial autonomy also makes it an insidious threat. It can spread itself automatically when executed on a Domain Controller, while clearing the event logs of the affected machines. Additionally, it’s extremely flexible, operating not only based on a built-in configuration but also on numerous optional arguments which allow it to change its behavior according to the operator’s needs. CPR researchers say that the ransomware raises the bar for ransom attacks and is one of the fastest and most sophisticated ransomware they’ve seen so far. Companies must deploy a prevention-first solution that can stop Rorschach from encrypting their data.

Customizable and Highly Efficient Encryption Speeds

Rorschach ransomware has been identified as one of the fastest and most sophisticated ransomware strains to date, with encryption speeds that are nearly twice as fast as LockBit 3.0, a notorious malware that made headlines in recent months. According to Check Point Research, Rorschach can encrypt 220,000 local drive files in just four and a half minutes, setting a new standard for cybercriminals. Rorschach’s highly efficient encryption speeds make it an especially concerning threat to businesses and organizations that are vulnerable to ransomware attacks.

Aside from its speedy encryption abilities, Rorschach is highly customizable, allowing cybercriminals to adjust the number of encryption threads to achieve even faster times. The ransomware also contains elements borrowed from leaked source code from other ransomware strains, creating a patchwork of techniques that make it highly unique and difficult to detect. This makes it an especially insidious threat that companies must be vigilant against.

The use of direct syscalls to silently inject malicious code into other processes is a startling new technique that Rorschach employs, making it more difficult to detect than other ransomware strains. This mechanism is commonly used to evade behavioral detection by advanced and sophisticated malware, which means that companies must deploy a prevention-first solution that can stop Rorschach from encrypting their data. In all, Rorschach represents a new era of ransomware attacks that businesses must take seriously and actively guard against.

Unique Features of “Rorschach” Ransomware

The “Rorschach” ransomware stands out from other strains of malware because of its unique coding elements. One of its standout features is its autonomous behavior, which allows it to spread itself automatically without the need for user interaction. In addition, “Rorschach” is partially autonomous, meaning that it can also clear the event logs of affected machines, making it more challenging to detect.

Another feature that sets “Rorschach” apart is its use of direct syscalls to inject malicious code into other processes silently. This technique is rare in the ransomware ecosystem and is typically used to evade behavioral detection by advanced malware. “Rorschach’s” implementation of this mechanism makes it much more difficult to detect, which is a cause for concern.

The malware also contains publicly known elements cribbed from leaked source code from other ransomware strains. However, the operators behind “Rorschach” do not employ an alias, nor do they brand their wares. This is very uncommon in the ransomware landscape, where reputation matters and self-promotion is rife. The result is a malware strain that is open to interpretation in terms of who its operators are and where it fits in the ecosystem — hence the name.

Potential Impact on Businesses and Individuals

The emergence of “Rorschach” ransomware with its highly customizable and efficient encryption speeds poses a significant threat to businesses and individuals. The ransomware can encrypt a large number of local drive files in just a few minutes, making it difficult for victims to recover their data without paying the ransom demanded by the attackers. The use of direct syscalls to silently inject malicious code into other processes, and partial autonomy means that it can spread itself automatically when executed on a domain controller without user interaction, making it even harder to detect and stop.

The use of a hybrid-cryptography scheme is one of the key reasons behind the ransomware’s encryption speed. Other ransomware strains use a single encryption algorithm. “Rorschach” uses a combination of algorithms. It makes more challenging to decrypt the files. In addition, the ability to adjust the number of encryption threads via the command line argument makes it possible to achieve even faster encryption times.

The potential impact of a “Rorschach” ransomware attack on businesses and individuals cannot be overstated. A successful attack can result in data loss, business disruption, and financial losses. Even if the victim decides to pay the ransom, there is no guarantee that they will get their data back. Or that the attackers won’t use the stolen data for other malicious purposes. He could sell it on the dark web for example. Therefore, it is crucial for businesses and individuals to take preventive measures. Regularly backing up their data. Using robust anti-malware solutions. Educating employees about the risks of ransomware attacks.

Prevention and Mitigation Strategies

The emergence of highly sophisticated ransomware attacks like “Rorschach” pose a significant risk to businesses and individuals. Traditional security measures like antivirus software and firewalls may not be enough to protect against such advanced threats. Companies need to adopt a risk-based vulnerability management approach to prioritize vulnerabilities that pose the greatest risk to their organization. Identify and prioritize assets. Assess the likelihood and impact of threats. Implemente controls to reduce the risk of exploitation.

In addition to risk-based vulnerability management, businesses and individuals can also benefit from attack surface monitoring. This involves monitoring the external and internal attack surface of an organization to identify potential vulnerabilities and threats. This includes monitoring for vulnerabilities in third-party software, identifying misconfigured or poorly secured systems, and identifying potential entry points for attackers.

It is impossible to completely eliminate the risk of a successful attack. But taking a proactive approach to security can greatly reduce the likelihood and impact of such attacks. It is important for organizations to continually reassess and improve their security posture to stay ahead of evolving threats.

Conclusion

The emergence of the “Rorschach” ransomware marks a new level of sophistication in the cybercrime landscape. With its highly customizable features and fast encryption speeds, this malware poses a significant threat to both businesses and individuals. The borrowing of code from other ransomware strains, make it difficult to detect and prevent. Along with its unique coding elements.

To mitigate the risk of a ransomware attack, businesses and individuals must take proactive measures. Risk-based vulnerability management and attack surface monitoring for example. By identifying and addressing vulnerabilities in their systems, organizations can reduce their likelihood of becoming a target for cybercriminals.

Ultimately, the ever-evolving nature of cyberattacks requires constant vigilance and proactive measures to stay protected. With the emergence of “Rorschach” ransomware, the need for strong cybersecurity measures is more pressing than ever before.

Tags: BabukDarkSidedata encryptionDLL side-loadingLockBit 2.0ransomwareRorschachYanluowang

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}