LockFile Ransomware Bypasses Protection Using Intermittent File Encryption

LockFile Ransomware
Share It On:

29th August 2021, Kathmandu

An incipient ransomware family that emerged last month comes with its own bag of artifices to bypass ransomware aegis by leveraging a novel technique called “intermittent encryption.”

Called LockFile, the operators of the ransomware have been found exploiting recently disclosed imperfections such as ProxyShell and PetitPotam to compromise Windows servers and deploy file-encrypting malware that scrambles only every alternate 16 bytes of a file, thereby giving it the faculty to eschew ransomware defenses.

“Partial encryption is generally utilized by ransomware operators to expedite the encryption process and we’ve visually perceived it implemented by BlackMatter, DarkSide, and LockBit 2.0 ransomware,” Mark Loman, Sophos director of engineering, verbally expressed in a verbalization. “What sets LockFile apart is that, unlike the others, it doesn’t encrypt the first few blocks. Instead, LockFile encrypts every other 16 bytes of a document.”

“This denotes that a file such as a text document remains partially readable and looks statistically like the pristine. This artifice can be prosperous against ransomware auspice software that relies on inspecting content utilizing the statistical analysis to detect encryption,” Loman integrated.

Sophos’ analysis of LockFile emanates from an artifact that was uploaded to VirusTotal on August 22, 2021.

Once deposited, the malware withal takes steps to terminate critical processes associated with virtualization software and databases via the Windows Management Interface (WMI), afore proceeding to encrypt critical files and objects, and exhibit a ransomware note that bears stylistic homogeneous attributes with that of LockBit 2.0.

The ransom note withal urges the victim to contact a concrete electronic mail address “contact@contipauper.com,” which Sophos suspects could be a derogatory reference to a competing ransomware group called Conti.

What’s more, the ransomware expunges itself from the system post prosperous encryption of all the documents on the machine, denoting that “there is no ransomware binary for incident responders or antivirus software to find or emaculate.”

“The message here for advocators is that the cyberthreat landscape never stands still, and adversaries will expeditiously seize every possible opportunity or implement to launch a prosperous attack,” Loman verbally expressed.

The disclosure comes as the U.S. Federal Bureau of Investigation (FBI) relinquished a Flash report detailing the tactics of an incipient Ransomware-as-a-Accommodation (RaaS) outfit kenned as Hive, consisting of a number of actors who are utilizing multiple mechanisms to compromise business networks, exfiltrate data and encrypt data on the networks, and endeavor to amass a ransom in exchange for access to the decryption software.


Share It On:

Recent Posts

NBA and IMF Discuss Financial Sector Trends and Challenges Under ECF Review

NBA and IMF Discuss Financial Sector Trends and Challenges Under

Share It On:9th January 2024, Kathmandu The Nepal Bankers’ Association (NBA) recently held a high-level meeting with the International Monetary

Neta V and X of CG Motors: Strengthening Presence in Thailand and Nepal

Neta V and X of CG Motors: Strengthening Presence in

Share It On:9th January 2024, Kathmandu The Neta brand has established a strong presence in Thailand’s electric vehicle (EV) market.

Ncell Prioritizes Customer Trust: Achieves ISO 27001 & 27701

Ncell Prioritizes Customer Trust: Achieves ISO 27001 & 27701

Share It On:9th January 2024, Kathmandu Ncell, a leading telecom company in Nepal, has achieved the prestigious ISO 27001:2022 (ISMS)

LBEF Intra-College Hackathon Set to Ignite Innovation Among Students

LBEF Intra-College Hackathon Set to Ignite Innovation Among Students

Share It On:9th January 2024, Kathmandu The countdown has officially begun for the much-anticipated LBEF Intra-College Hackathon, an exciting three-day

EHang & Changan Automobile: A Strategic Partnership to Develop Next-Generation Flying Cars

EHang & Changan Automobile: A Strategic Partnership to Develop Next-Generation

Share It On:8th January 2024, Kathmandu EHang Holdings Limited (Nasdaq: EH), the world’s leading Urban Air Mobility (UAM) technology platform

Nepal’s Cybersecurity Crisis: Are We Prepared for the Future?

Nepal’s Cybersecurity Crisis: Are We Prepared for the Future?

Share It On:8th January 2024, Kathmandu Is Nepal ready to combat cyber threats? Explore real incidents, vulnerabilities, and actionable strategies