BTC $63060.4292
ETH $3124.6408
BNB $593.8008
SOL $136.2835
stETH $3115.4177
XRP $0.5155
DOGE $0.1451
TON $5.2447
ADA $0.4546
AVAX $34.0863
wstETH $3637.9458
TRX $0.1206
WBTC $63071.9741
WETH $3123.7782
DOT $6.6636
BCH $472.0051
LINK $14.1351
MATIC $0.6954
UNI $7.6897
LTC $86.4220
ICP $12.9296
DAI $0.9993
CAKE $2.7178
NEAR $7.0616
RNDR $7.9244
IMX $2.0517
FDUSD $1.0016
ETC $26.6754
HBAR $0.1087
STX $2.5130
MNT $1.0796
FIL $5.7904
OKB $52.0204
PEPE $0.0000
TAO $422.6475
VET $0.0386
ATOM $8.2111
WIF $2.6905
MKR $2898.6865
KAS $0.1125
GRT $0.2612
USDE $0.9992
FET $2.1245
INJ $25.4763
THETA $2.2720
XLM $0.1124
XMR $120.3744
BTC $63060.4292
ETH $3124.6408
BNB $593.8008
SOL $136.2835
stETH $3115.4177
XRP $0.5155
DOGE $0.1451
TON $5.2447
ADA $0.4546
AVAX $34.0863
wstETH $3637.9458
TRX $0.1206
WBTC $63071.9741
WETH $3123.7782
DOT $6.6636
BCH $472.0051
LINK $14.1351
MATIC $0.6954
UNI $7.6897
LTC $86.4220
ICP $12.9296
DAI $0.9993
CAKE $2.7178
NEAR $7.0616
RNDR $7.9244
IMX $2.0517
FDUSD $1.0016
ETC $26.6754
HBAR $0.1087
STX $2.5130
MNT $1.0796
FIL $5.7904
OKB $52.0204
PEPE $0.0000
TAO $422.6475
VET $0.0386
ATOM $8.2111
WIF $2.6905
MKR $2898.6865
KAS $0.1125
GRT $0.2612
USDE $0.9992
FET $2.1245
INJ $25.4763
THETA $2.2720
XLM $0.1124
XMR $120.3744
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • U.S. organizations have fallen victim to the new MortalKombat ransomware

    Numerous organizations in the US, UK, Turkey and the Philippines have been targeted by a new ransomware program that cybersecurity researchers have dubbed MortalKombat.

    Cisco Talos experts are tracking down an unknown group that deployed MortalKombat and also developed a new cryptocurrency-stealing malware called Laplas Clipper. Most of the victims of the campaign were in the US. Cisco researchers linked two URLs to the campaign, one of which leads to a C2 server in Poland.

    Mortal Kombat was first discovered in January 2023, and nothing is known about its developers or operating model at this time. The name of the ransomware and the wallpaper it drops on the victim system are a reference to the Mortal Kombat media franchise, according to analysts.

    The ransomware encrypts various files on the victim's system:

    • system files;
    • application files;
    • database files, backups and virtual machines;
    • files in remote locations that appear as logical drives.

    According to a Cisco Talos report, a ransomware group is scanning the Internet for organizations that have left RDP protocols open. Thus, the victims of the attacks were individuals, small businesses and large organizations.

    Other attacks in the campaign start with phishing emails accompanied by a ZIP archive. When opened, Laplas Clipper malware or MortalKombat ransomware are deployed and then removed to cover their tracks and make analysis difficult.

    In one email, hackers posed as crypto-currency platform CoinPayments. In the email, the ZIP archive allegedly contained information about a specific transaction, prompting the victim to open it. When the archive is opened, MortalKombat starts, changes the wallpaper of the victim's computer, crashes Windows Explorer, and removes some applications.

    Among other similarities, the code similarity indicates that the ransomware belongs to the Xorist family, which has existed since 2010, the researchers said. The ease of customization of Xorist allows cybercriminals to create new variants with different names, file extensions, and ransom notes.

    Along with MortalKombat, researchers found Laplas Clipper malware, which they previously identified in a November 2022 attack. Unlike standard clippers, which simply change the recipient's copied wallet address to the attacker's, Laplas Clipper uses an address very similar to the one the user copied. This process takes place on the attacker's server, so the exact mechanism remains unknown.

    In about a week, the number of Laplas Clipper samples went from 20 to 55 per day at the end of October. Then the researchers concluded that Laplas Clipper is distributed through Smoke Loader and Raccoon Stealer, which indicates the increased attention of the cybercriminal community to this program. Developers MortalKombat and Laplas Clipper have stated on Telegram that they are making new variants of Laplas Clipper and plan to release updates in the coming months.

    Author DeepWeb
    The new Beep malware is almost impossible to detect
    Botnet MyloBot is rapidly spreading around the world

    Comments 0

    Add comment