{"id":34384,"date":"2020-06-16T04:17:00","date_gmt":"2020-06-16T08:17:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=34384"},"modified":"2020-06-16T04:17:00","modified_gmt":"2020-06-16T08:17:00","slug":"new-tycoon-ransomware-strain-targets-windows-linux","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/06\/16\/new-tycoon-ransomware-strain-targets-windows-linux\/","title":{"rendered":"New &#8216;Tycoon&#8217; Ransomware Strain Targets Windows, Linux"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">Kelly Sheridan<\/a> &#8211; A newly discovered form of Java-based <strong>ransomware<\/strong> has been spotted in active and seemingly targeted attacks on education and software companies, researchers from BlackBerry and KPMG report. This strain, dubbed Tycoon, uses an obscure Java image format to bypass security tools.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2012\/04\/12\/20\/37\/moneybags-30556__340.png\" alt=\"\" width=\"427\" height=\"558\"\/><\/figure><\/div>\n\n\n\n<p>The discovery began when KPMG&#8217;s UK Cyber Response Services team was contacted to respond to a targeted attack against an educational institution. BlackBerry&#8217;s Research and Intelligence team, which works with KPMG, analyzed the threat. The Tycoon <strong>ransomware<\/strong>, they say, has been observed in the wild since December 2019 and targets both Windows and Linux machines. Its victim count is &#8220;limited,&#8221; researchers say, suggesting it may be a highly targeted threat.<\/p>\n\n\n\n<p>In this case, an attacker connected to the target system using a&nbsp;Remote Desktop Protocol&nbsp;(RDP) server on the network, then located a target and obtained local administrator credentials. From there, they&nbsp;located a target and obtained local administrator credentials, installed process hacker-as-a-service, and disabled antivirus. They dropped a backdoor so they could gain re-entry and left.<\/p>\n\n\n\n<p>Seven days later, the attacker connected to an RDP server and used it to move laterally across the network, making RDP connections to multiple systems. Analysis indicates RDP connections were manually initiated for each server, BlackBerry&#8217;s team states in a blog post. The attacker then ran process hacker-as-a-service and disabled antivirus, then executed the <strong>ransomware<\/strong>. It follows this same process for each infected server on the network, and files are encrypted with extensions including .thanos, .grinch, and .redrum.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.darkreading.com\/vulnerabilities---threats\/new-tycoon-ransomware-strain-targets-windows-linux\/d\/d-id\/1338006&amp;ct=ga&amp;cd=CAEYBSoUMTUyODQxMDI5Nzc3MTA4OTc3MTcyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNEbncZFP44oIScaFrQ4EcVlV4LejA\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Kelly Sheridan &#8211; A newly discovered form of Java-based ransomware has been spotted in active and seemingly targeted attacks on education and software companies, researchers from BlackBerry and KPMG report. This strain, dubbed Tycoon, uses an obscure Java image <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/06\/16\/new-tycoon-ransomware-strain-targets-windows-linux\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-34384","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=34384"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34384\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=34384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=34384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=34384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}