• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Oral-B iO10 Limited Edition electric toothbrush review: The last word in luxury – and price

January 29, 2026

9 Essential iPhone Accessibility Features to Use in 2026

January 29, 2026

Apple Watch SE 3 review: The easy choice

January 29, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Adaptive RedAlert, Monster ransomwares go cross-platform
Tech News

Adaptive RedAlert, Monster ransomwares go cross-platform

August 25, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Adaptive RedAlert, Monster ransomwares go cross-platform
Share
Facebook Twitter LinkedIn Pinterest Email

The builders of two newly emergent ransomware households, RedAlert and Monster, are utilizing novel strategies to unfold their assaults as extensively as doable by exploiting a number of totally different working methods (OSes) on the similar time, in accordance with analysis shared by cyber big Kaspersky.

Using multi-platform ransomwares is nothing new as such. Certainly, Kaspersky stated it has been witnessing their “prolific use” this yr.

The goal of such ransomwares is to have the ability to harm as many methods as doable by adapting their code to a number of OSes without delay.

Nonetheless, whereas different cross-platform ransomwares, resembling Luna or BlackCat, use multiplatform languages resembling Rust or Go/Golang, RedAlert and Monster will not be written in a cross-platform language however retain the power to focus on numerous OSes concurrently.

“We’ve acquired fairly used to the ransomware teams deploying malware written in cross-platform language,” stated Jornt van der Wiel, a senior safety researcher on Kaspersky’s World Analysis and Evaluation Crew (GReAT). “Nonetheless, as of late, cyber criminals discovered to regulate their malicious code written in plain programming languages for joint assaults – making safety specialists elaborate on methods to detect and stop the ransomware makes an attempt.”

RedAlert – which is also called N13V – is coded in plain previous C, or at the very least the Linux-targeting model Kaspersky dissected was, and explicitly targets each Home windows and Linux-based VMware ESXi servers. It incorporates command line choices that permit its controllers hunt down and shut off any working digital machines (VMs) earlier than encrypting recordsdata related to ESXi VMs.

See also  Inkbound is an upcoming turn-based roguelike from the Monster Train devs

Its darkish site presents a decryptor for obtain that the group claims is accessible for all platforms, though Kaspersky has not been capable of confirm whether or not the decryptor is written in a cross-platform language. RedAlert in any other case makes use of pretty customary double extortion techniques.

An additional noteworthy – albeit unrelated – level is that RedAlert solely accepts ransom funds within the Monero cryptocurrency, which isn’t accepted in each nation or by each change, making funds tougher for the sufferer.

“For the reason that group is comparatively younger, we couldn’t discover out so much in regards to the victimology, however RedAlert stands out as an fascinating instance of a gaggle that managed to regulate their code written in C to totally different platforms,” the researchers stated.

The Monster ransomware – first detected in July 2022 by Kaspersky’s Darknet monitoring system – is written within the general-purpose Delphi language that expands on totally different methods. Nonetheless, this group stands out as a result of it features a graphical person interface (GUI), a part that no different recognized ransomware crew has ever applied earlier than.

Kaspersky admitted this characteristic was one thing of a puzzle to them. “This latter property is very peculiar, as we don’t keep in mind seeing this earlier than,” it stated. “There are good causes for this, as a result of why would one undergo the trouble of implementing this when most ransomware assaults are executed utilizing the command line in an automatic means throughout a focused assault?

“The ransomware authors should have realised this as properly, since they included the GUI as an non-obligatory command-line parameter.”

See also  LG reconsidering $1.3 billion Arizona battery plant in light of "unprecedented economic conditions"

Extra info on each these ransomwares, together with numerous screenshots, in addition to further intelligence on the vulnerabilities used of their assaults, is accessible from Kaspersky.

Source link

Adaptive CrossPlatform Monster ransomwares RedAlert
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How to Use Adaptive Audio and Conversation Awareness on AirPods

January 7, 2026

Adaptive Battery Management Lands on the iPhone in iOS 26

June 12, 2025

Nubia Redmagic 10 Pro review: Mobile gaming monster

December 3, 2024

Apple releases iOS 17.5 with new games in News+, cross-platform tracking detection, more

May 13, 2024
Add A Comment

Comments are closed.

Editors Picks

Barclays and Maven invest in Manchester-based fintech startup Nivo

December 22, 2022

Marcie Takes the Lead in Apple’s Heartwarming ‘Snoopy Presents’ Apple TV+ Original

August 3, 2023

This Respected Security Researcher Stole $2.5 Million From Apple

February 8, 2024

Flyhomes does another round of layoffs as slowing housing market hurts real estate tech companies – Startup

November 9, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Oral-B iO10 Limited Edition electric toothbrush review: The last word in luxury – and price

9 Essential iPhone Accessibility Features to Use in 2026

Apple Watch SE 3 review: The easy choice

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.