Quick Heal Security Labs has observed the entry of a new BTCWare ransomware (first observed at the beginning of 2017) variant called ‘Aleta’. This ransomware is called so because it appends a “.aleta” extension to files it encrypts in an infected computer. Although BTCWare ransomware variants do not seem to use any special techniques or exploits like WannaCry or NotPetya ransomware did, it uses RDP Brute-Force attacks to gain access to the infected system.
Read more on how RDP is exploited by attackers to spread ransomware and other malware.
BTCWare Aleta ransomware uses the AES256 encryption scheme. An interesting IOC (indicator of compromise) observed with the ransomware is the email ID associated with requesting the decryption key – black.mirror@qq.com. This email has been previously reported to have been associated with different variants of Amnesia & BTCWare ransomware. Spam emails with malicious attachments containing malicious script, doc, and executable files are used by this ransomware as its carrier.
Ransom note
Quick Heal Protection against BTCWare (Aleta) Ransomware
Fig 1. Quick Heal IDS/IPS Protection
Fig 2. Quick Heal Signature Detection
Fig 3. Quick Heal Virus Protection (Script File)
Fig 4. Quick Heal Advanced Behavior Detection System
Stay away from ransomware with these security tips
Acknowledgement
Subject Matter Expert
– Shantanu Vichare | Quick Heal Security Labs
No Comments, Be The First!