Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Yurei Ransomware Leverages SMB Shares and Removable Drives to Encrypt Files

Posted on October 8, 2025October 8, 2025 By CWS

Yurei ransomware first emerged in early September 2025, concentrating on Home windows environments with a classy Go-based payload designed for fast, large-scale encryption.

As soon as executed, the malware enumerates all accessible native and community drives, appends a .Yurei extension to every file, and writes distinctive ransom notes in each affected listing.

Ransom Be aware (Supply – Cyfirma)

Its operators then demand fee over Tor, warning that shadow copies, backups, and log information have been irreversibly destroyed to frustrate restoration efforts.

Distributed primarily by means of stolen credentials and spear-phishing campaigns, Yurei exploits Home windows Administration Instrumentation (WMI) and credential-based distant execution to achieve a foothold in company networks.

After preliminary compromise, the binary phases itself in non permanent folders and deploys PowerShell scripts that disable Quantity Shadow Copy Service (VSS) and delete all current backups.

Cyfirma analysts famous that the ransomware’s mixture of per-file ChaCha20 encryption keys wrapped with ECIES and its self-cleaning routines make forensic investigation exceedingly tough.

Upon deployment, Yurei enters an infinite propagation loop, copying itself onto USB units as WindowsUpdate.exe and into writable SMB shares as System32Backup.exe.

This twin propagation technique permits the malware to leapfrog community segmentation controls and unfold laterally with minimal detection.

Victims report that encrypted information change into fully inaccessible, since every ChaCha20 key and nonce pair is asymmetrically wrapped with the attackers’ embedded public key and saved in a customized header separated by the ASCII marker 0x7c7c.

An infection Mechanism and Lateral Propagation

The core of Yurei’s an infection mechanism depends on PowerShell and native Home windows utilities to propagate throughout detachable and community drives.

First, it queries all volumes of sort “detachable” by way of WMI and checks for an current WindowsUpdate.exe at every root.

If absent, it copies the ransomware executable from its temp staging listing. Subsequent, it enumerates SMB shares by way of PowerShell’s Get-SmbShare cmdlet and iterates over every writable share path, utilizing Copy-Merchandise to drop System32Backup.exe.

A snippet illustrating the detachable‐media propagation routine is proven under.

# Determine 1: Detachable drive propagation utilizing PowerShell
$drives = Get-WmiObject -Class Win32_Volume | The place-Object {$_.DriveType -eq 2}
foreach ($drive in $drives) {
$path = “$($drive.DriveLetter)WindowsUpdate.exe”
if (-not (Take a look at-Path $path)) {
Copy-Merchandise -Path $MyInvocation.MyCommand.Definition -Vacation spot $path -Power
}
}

As soon as copied, Yurei spawns every dropped occasion remotely by way of a PSCredential-based CIM session or PsExec-style invocation, guaranteeing the payload executes below elevated privileges with out consumer interplay.

The script constructs a System.Administration.Automation.PSCredential object and invokes Invoke-CimMethod to create a course of on distant hosts, copying its personal binary bytes to disk earlier than execution.

By combining these stealthy propagation loops with aggressive anti-forensics—deleting VSS snapshots (vssadmin Delete Shadows /Quiet), clearing occasion logs, and overwriting its binary in reminiscence—Yurei represents a extremely automated, self-propagating menace designed for max community penetration and irreversible knowledge compromise.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Drives, Encrypt, Files, Leverages, Ransomware, Removable, Shares, SMB, Yurei

Post navigation

Previous Post: Google Offers Up to $20,000 in New AI Bug Bounty Program
Next Post: Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code

Related Posts

HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance Cyber Security News
Nevada IT Systems Hit by Cyberattack Cyber Security News
Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k Cyber Security News
Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster 
  • Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server
  • Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
  • AI Takes Center Stage at DataTribe’s Cyber Innovation Day
  • Will AI-SPM Become the Standard Security Layer for Safe AI Adoption?

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster 
  • Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server
  • Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
  • AI Takes Center Stage at DataTribe’s Cyber Innovation Day
  • Will AI-SPM Become the Standard Security Layer for Safe AI Adoption?

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News