Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands

Posted on May 9, 2025May 12, 2025 By CWS

A brand new ransomware pressure dubbed “Mamona” that operates solely offline and leverages a intelligent assault technique that abuses the Home windows ping command.

Not like conventional ransomware that communicates with distant servers, Mamona works fully offline, making it significantly troublesome to detect with typical community monitoring instruments.

“This pressure highlights a rising development: ransomware that trades complexity for accessibility. It’s straightforward to deploy, more durable to detect with conventional instruments, and nonetheless efficient sufficient to encrypt programs and stress victims into paying,” Mauro Eldritch famous.

What makes Mamona distinctive is its “mute” operation – it performs all actions domestically, with no noticed Command and Management channels or knowledge exfiltration.

The ransomware employs a particular delay mechanism by pinging the weird loopback deal with 127.0.0.7 relatively than the usual 127.0.0.1, more likely to evade easy detection guidelines

This pressure highlights a rising development: ransomware that trades complexity for accessibility. It’s straightforward to deploy, more durable to detect with conventional instruments, and nonetheless efficient sufficient to encrypt programs and stress victims into paying.

Mamona Ransomware’s Encryption& Obfuscation

Upon an infection, Mamona executes a sequence of rigorously designed steps. First, it makes use of the ping command as a crude timing mechanism, adopted instantly by a self-deletion command to restrict forensic evaluation.

As soon as the brief delay is full, the second a part of the command makes an attempt to delete the executable from disk utilizing Del /f /q,” defined researcher Mauro Eldritch.

It performs reconnaissance by accumulating fundamental system data equivalent to the pc identify and configured language.

Recordsdata are encrypted utilizing a do-it-yourself cryptographic routine relatively than customary libraries, with all encryption logic applied by means of low-level reminiscence manipulation and arithmetic operations.

Attempt ANY.RUN’s Interactive Sandbox For Interactive Malware Evaluation 

Encrypted information obtain the “.HAes” extension (e.g., “doc.pdf” turns into “doc.pdf.HAes”), and a ransom word titled “README.HAes.txt” is dropped in a number of directories.

Recordsdata are encrypted utilizing a customized, do-it-yourself encryption routine relatively than customary cryptographic libraries, and are renamed with the .HAes extension.

The ransomware adjustments the desktop wallpaper to show “Your information have been encrypted!”.

Regardless of threatening to leak stolen knowledge in its ransom word, evaluation confirms Mamona performs no precise knowledge exfiltration. “There’s actually no community exercise, so this appears to be a risk to coerce the sufferer into paying the ransom,” safety consultants concluded.

Mamona has been linked to campaigns beforehand run by BlackLock ransomware associates, who’re additionally related to a different pressure known as Embargo. The ransomware gained further notoriety when the DragonForce group reportedly took over operations after BlackLock was dismantled in March 2025.

Whereas Mamona makes use of comparatively weak encryption strategies, its offline operation and ease-of-use for low-skill cybercriminals pose vital dangers to each people and organizations.

The ransomware significantly threatens small and medium-sized companies with out subtle safety monitoring.

Luckily, safety researchers have recognized and examined a working decryption device. “Regardless of the decrypter that includes an outdated interface, it successfully restores encrypted information,” researchers confirmed.

The emergence of Mamona reinforces a regarding development within the ransomware panorama – the shift towards simply accessible, builder-based ransomware that prioritizes simplicity over sophistication, decreasing the barrier to entry for much less technical cybercriminals.

Combine ANY.RUN Options in Your Firm – Get a Free Trial

Cyber Security News Tags:Abusing, Attack, Commands, Machines, Mamona, Ping, Ransomware, Windows

Post navigation

Previous Post: New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
Next Post: OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

Related Posts

VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands Cyber Security News
Securing the Cloud Best Practices for Multi-Cloud Environments Cyber Security News
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication Cyber Security News
YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack Cyber Security News
BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide Cyber Security News
New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News