Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments

Posted on July 22, 2025July 22, 2025 By CWS

A complicated new ransomware menace has emerged from the cybercriminal underground, focusing on organizations throughout a number of working techniques with superior cross-platform capabilities.

In June 2025, a ransomware actor working beneath the alias “Greenback Greenback Greenback” launched GLOBAL GROUP on the Ramp4u cybercrime discussion board, advertising and marketing it as a cutting-edge Ransomware-as-a-Service (RaaS) platform.

The group promised associates scalable operations with automated negotiations, cross-platform payloads, and beneficiant profit-sharing preparations that might enchantment to cybercriminals searching for dependable monetization alternatives.

The malware represents a major evolution in ransomware improvement, using Golang programming language to create monolithic binaries able to executing seamlessly throughout Home windows, Linux, and macOS environments.

This multi-platform strategy permits menace actors to focus on various IT infrastructures inside a single assault marketing campaign, maximizing their potential sufferer pool and operational effectivity.

The selection of Golang displays present business developments the place attackers leverage the language’s concurrency mannequin and static linking capabilities to speed up encryption processes at unprecedented scale.

Nonetheless, forensic evaluation carried out by Picus Safety Labs researchers revealed that GLOBAL GROUP shouldn’t be a wholly new menace household however quite a classy rebranding of current ransomware operations.

By detailed examination of malware samples, infrastructure configurations, and operational patterns, analysts recognized clear connections to the defunct Mamona RIP and Black Lock ransomware households, suggesting continuity quite than innovation within the menace panorama.

Proof of this connection turns into obvious by way of technical artifacts embedded inside the malware samples.

The ransomware binary accommodates a particular mutex string “GlobalFxo16jmdgujs437” that forestalls a number of simultaneous executions of the ransomware course of.

This an identical mutex was beforehand recognized in Mamona RIP ransomware samples, indicating direct codebase inheritance quite than coincidental similarity.

The reuse of such particular technical markers demonstrates that GLOBAL GROUP represents an evolution of confirmed assault methodologies quite than ground-up improvement.

Superior Encryption and Payload Structure

The ransomware’s technical sophistication extends past its cross-platform capabilities to embody trendy cryptographic implementations and optimized execution methods.

GLOBAL GROUP employs the ChaCha20-Poly1305 encryption algorithm, a up to date alternative that gives each confidentiality and message integrity verification.

This algorithm choice demonstrates the operators’ dedication to implementing strong encryption that resists cryptanalysis whereas sustaining operational effectivity throughout large-scale file processing operations.

The malware’s structure exploits Golang’s native concurrency options by way of goroutines to deal with encryption throughout all accessible drives concurrently.

This parallel processing strategy considerably reduces the time required to encrypt sufferer techniques, minimizing the window for detection and response.

Every encrypted file receives a customized extension outlined by particular person associates, akin to “.lockbitloch,” whereas filenames themselves are sometimes encrypted to additional complicate restoration efforts with out correct decryption keys.

Decompilation of the binary reveals hardcoded ransom be aware building logic embedded instantly inside the executable.

The malware makes use of particular perform calls to assemble sufferer communication messages, together with embedded Tor community addresses for accessing leak websites and negotiation portals.

This integration demonstrates the operators’ deal with streamlining the extortion course of whereas sustaining operational safety by way of anonymized communication channels.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Attacks, Environments, Global, Golang, Groups, Linux, macOS, Ransomware, Windows

Post navigation

Previous Post: Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access
Next Post: ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets

Related Posts

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding Cyber Security News
Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Cyber Security News
Chrome Security Update Patches Critical Remote Code Execution Vulnerability Cyber Security News
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark