• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

AZORult and Hermes Join Hands to Spread Terror

August 16, 2018Simeon Georgiev

Ransomware removal reporters have informed the public of the presence of an updated variant of AZORult malware that is partnering with the Hermes Ransomware.

AZORult was first found in the cybersecurity spheres two years ago in 2016 when it served as a subordinate to a virus infiltrating banks, known as Chthonic. Afterwards, the malware was for a plethora of infection mechanisms in different malware campaigns. The modus operandi of AZORult was with its proliferation through spam email campaigns as well as being a recurrent constituent of exploit kits.  

Ransomware removal researchers discovered an advertisement of AZORult on 17 July 2018 in a hacking forum. An infamous cybercriminal group that goes by the name of TA516 has been alleged to be the latest operator of the malware.

A number of phishing email campaigns were launched by the above-mentioned cybercriminal group that pretended to deliver job applications. The job documents were locked and users were provided with a password to unlock the job details. The emails were attached with documents consisting of malicious payloads.

However, ransomware removal analysts have strictly discouraged the opening of any such emails as various users entered the given password and were subsequently infected with a secondary payload of AZORult malware which in turn dropped the Hermes Ransomware to propagate further damage and exploitation of the affected systems.

Ransomware removal experts note that this is not the first cybercrime that is associated with TA516. Earlier in 2017 security analysts studied and found the group as part of a cyber threat where they were engaged in similar tactics by enticing users with job resumes. Many unemployed victims desperately clicked and downloaded malicious files laced with banking Trojans as well as crypto-malware. This malware was found to be using the computing resources of the victims to mine Monero as well as sending it to the remote locations of the cybercriminals.  

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post SamSam Ransomware Collected $6 Million in Ransom Next post How Organizations Recover Following a Ransomware Attack

Related Articles

Ransomware Removal Tools that Ensure You Keep Your System after an Attack

January 24, 2018Simeon Georgiev
Ransomware Removal Tools that Ensure You Keep Your System after an Attack

Amnesia Ransomware Decryptor Developed by Emsisoft

February 24, 2018Simeon Georgiev
Amnesia Ransomware Decryptor Developed by Emsisoft

WannaCry: How does it Work?

February 28, 2018Simeon Georgiev
WannaCry: How does it Work?

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.