company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Ransomware

loading..
loading..
loading..

Mount Locker Ransomware, aka AstroLocker scaling-up its infiltration tactics daily

Mount Locker ransomware is making rapid alterations to its techniques and tricks

23-Apr-2021
3 min read

According to researchers, the Mount Locker ransomware has caused quite a chaos up in the latest campaigns along with the usage of more sophisticated scripting as well as anti-prevention features. This alteration in the techniques seems to coincide with a rebranding for the malware into “AstroLocker.”

Anonymized-Ransom-Note-1-1024x655

According to what the cyber researchers say, Mount Locker has been a fast-moving threat. It had just hit the ransomware-as-a-service scene in the latter half of 2020, and the group released a major update in November that widened its targeting abilities (entailing searching for file extensions used by TurboTax tax-return software to encrypt). It further added improved and advanced detection evasion. Attacks went on to escalate, and now, in the current situation, another important update hints at “an aggressive shift in Mount Locker’s tactics,” according to an analysis that has been released Thursday by GuidePoint Security.

“After the environment is mapped, backup systems are identified and neutralized, and data is harvested, systems are encrypted with target-specific ransomware delivered via the established command-and-control channels (C2),” stated Drew Schmitt, a senior threat intelligence analyst for GuidePoint, in the analysis. “These payloads include executables, extensions, and unique victim IDs for payment.”

Latest campaigns have shaken things up with new batch scripts, researchers found. These are crafted to disable detection as well as prevention tools.

“[This] indicates that Mount Locker is increasing its capabilities and is becoming a more dangerous threat,” according to Schmitt. “These scripts were not just blanket steps to disable a large swath of tools, they were customized and targeted to the victim’s environment.”

Healthcare and biotech firms are also major targets, and that is because they stand to lose the most if operations are stopped for a very long time or critical IP is lost, Schmitt pointed out. That is why “attackers view them as more likely to pay the requested ransom quickly,” he said.

“Biotech companies, in particular, are a prime target for ransomware because of their position in an industry flush not only with cash but also with highly sensitive IP,” Schmitt explained. “Additionally, connections to other research organizations increase the potential to damage the victim’s reputation in the industry and put business dealings at risk.”

“While these would always be cause for alarm…an updated, more aggressive Mount Locker and the dramatic increase in attacks attributable to the group make these indicators of compromise particularly alarming,” Schmitt said lastly.