Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Underground Ransomware Gang With New Tactics Against Organizations Worldwide

Underground Ransomware Gang With New Tactics Against Organizations Worldwide

Posted on August 28, 2025August 28, 2025 By CWS

Over the previous yr, the Underground ransomware gang has emerged as a formidable risk to organizations throughout various industries and geographies.

First recognized in July 2023, the group resurfaced in Might 2024 with a Devoted Leak Web site (DLS), signaling a renewed and extra subtle operational part.

Their campaigns now span from the United Arab Emirates to South Korea, focusing on corporations in development, manufacturing, IT, and past.

Victims report encrypted essential belongings and threatened information leaks, with ransom calls for that exploit each technical and psychological stress.

Of their newest modus operandi, Underground operators meticulously tailor every assault to the sufferer’s surroundings.

Preliminary infiltration usually leverages stolen credentials or unpatched vulnerabilities in distant desktop companies.

As soon as inside, they disable shadow copies utilizing the vssadmin delete shadows /all /quiet command, stripping victims of fast rollback choices.

Means of checking the variety of preliminary argument values (Supply – ASEC)

ASEC analysts famous that this hands-on strategy transforms routine environments into totally compromised landscapes, leaving forensic traces that complicate incident response.

Following reconnaissance, the ransomware proceeds with encryption routines that mix AES symmetric encryption and RSA uneven wrapping.

Every file is encrypted with a novel AES key, whereas the important thing materials and initialization vector (IV) are sealed with a hardcoded RSA public key earlier than being appended to the file.

No exterior C2 communication happens throughout encryption, guaranteeing that native proof alone can’t facilitate decryption.

Ultimate metadata format (Supply – ASEC)

The encryption metadata—spanning the file’s unique dimension, flag units, model, and magic values—is structured in an 0x18-byte block affixed on the finish of every file.

An infection Mechanism Deep Dive

The core of Underground’s an infection mechanism lies in its multi-stage payload execution. Upon launch, the binary checks its command-line parameters and exits instantly if greater than two arguments are detected, a rudimentary anti-analysis safeguard.

The malware then declares a mutex string, “8DC1F7B9D2F4EA58,” to stop a number of situations.

With out using superior sandbox evasion methods, it swiftly executes pre-encryption routines: deleting shadow copies, modifying registry keys to limit distant desktop disconnections, and halting SQL companies with instructions reminiscent of:-

reg add HKLMSOFTWAREPoliciesMicrosoftWindows NTTerminal Companies /v MaxDisconnectionTime /t REG_DWORD /d 1209600000 /f
web cease MSSQLSERVER /f /m
web cease SQLSERVERAGENT /f /m
web cease MSSQLFDLauncher /f /m

SystemTime 6 months in the past being handed to the encryption-related operate (Supply – ASEC)

By excluding system directories and executable extensions—reminiscent of .exe, .dll, and .sys—the malware avoids crippling the working system, focusing its damaging energy on user-generated content material.

Structural change between the unique file and the encrypted file (Supply – ASEC)

As soon as the surroundings is primed, a 0x30-byte random quantity is generated by way of the BCrypt API, partitioned right into a 0x20-byte AES key and a 0x10-byte IV.

Recordsdata are learn into reminiscence, encrypted in place, after which appended with the RSA-encrypted key materials (0x200 bytes).

For big information, a striping technique encrypts head, tail, and periodic segments utilizing flag values that dictate encryption unit dimension and hole intervals, balancing efficiency and file influence.

Lastly, the ransomware deploys an _eraser.bat script to purge Home windows occasion logs by way of wevtutil.exe, erasing traces of its exercise and hindering root trigger evaluation.

Via these refined ways, Underground leverages a mix of traditional and superior strategies, underscoring the significance of proactive patching, segmented backups, and strong endpoint monitoring to defend towards its evolving risk.

Increase your SOC and assist your workforce shield your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Gang, Organizations, Ransomware, Tactics, Underground, Worldwide

Post navigation

Previous Post: Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents
Next Post: CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks

Related Posts

TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands Cyber Security News
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
“PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram “PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram Cyber Security News
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data Cyber Security News
Blockchain Security – Protecting Decentralized Systems Blockchain Security – Protecting Decentralized Systems Cyber Security News
MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News