• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Sihoo Doro C300 and C300 Pro V2 office chair reviews: Affordable, comfortable ergonomics

May 2, 2026

Xiaomi 17 Ultra review: A balancing act

May 1, 2026

6 Common Mistakes to Avoid When Selling a Used CPU (2026 Guide)

April 30, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Tech News»Adaptive RedAlert, Monster ransomwares go cross-platform
Tech News

Adaptive RedAlert, Monster ransomwares go cross-platform

August 25, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Adaptive RedAlert, Monster ransomwares go cross-platform
Share
Facebook Twitter LinkedIn Pinterest Email

The builders of two newly emergent ransomware households, RedAlert and Monster, are utilizing novel strategies to unfold their assaults as extensively as doable by exploiting a number of totally different working methods (OSes) on the similar time, in accordance with analysis shared by cyber big Kaspersky.

Using multi-platform ransomwares is nothing new as such. Certainly, Kaspersky stated it has been witnessing their “prolific use” this yr.

The goal of such ransomwares is to have the ability to harm as many methods as doable by adapting their code to a number of OSes without delay.

Nonetheless, whereas different cross-platform ransomwares, resembling Luna or BlackCat, use multiplatform languages resembling Rust or Go/Golang, RedAlert and Monster will not be written in a cross-platform language however retain the power to focus on numerous OSes concurrently.

“We’ve acquired fairly used to the ransomware teams deploying malware written in cross-platform language,” stated Jornt van der Wiel, a senior safety researcher on Kaspersky’s World Analysis and Evaluation Crew (GReAT). “Nonetheless, as of late, cyber criminals discovered to regulate their malicious code written in plain programming languages for joint assaults – making safety specialists elaborate on methods to detect and stop the ransomware makes an attempt.”

RedAlert – which is also called N13V – is coded in plain previous C, or at the very least the Linux-targeting model Kaspersky dissected was, and explicitly targets each Home windows and Linux-based VMware ESXi servers. It incorporates command line choices that permit its controllers hunt down and shut off any working digital machines (VMs) earlier than encrypting recordsdata related to ESXi VMs.

See also  Will a weaker euro lead to greater US investment in European startups? – DailyTech

Its darkish site presents a decryptor for obtain that the group claims is accessible for all platforms, though Kaspersky has not been capable of confirm whether or not the decryptor is written in a cross-platform language. RedAlert in any other case makes use of pretty customary double extortion techniques.

An additional noteworthy – albeit unrelated – level is that RedAlert solely accepts ransom funds within the Monero cryptocurrency, which isn’t accepted in each nation or by each change, making funds tougher for the sufferer.

“For the reason that group is comparatively younger, we couldn’t discover out so much in regards to the victimology, however RedAlert stands out as an fascinating instance of a gaggle that managed to regulate their code written in C to totally different platforms,” the researchers stated.

The Monster ransomware – first detected in July 2022 by Kaspersky’s Darknet monitoring system – is written within the general-purpose Delphi language that expands on totally different methods. Nonetheless, this group stands out as a result of it features a graphical person interface (GUI), a part that no different recognized ransomware crew has ever applied earlier than.

Kaspersky admitted this characteristic was one thing of a puzzle to them. “This latter property is very peculiar, as we don’t keep in mind seeing this earlier than,” it stated. “There are good causes for this, as a result of why would one undergo the trouble of implementing this when most ransomware assaults are executed utilizing the command line in an automatic means throughout a focused assault?

“The ransomware authors should have realised this as properly, since they included the GUI as an non-obligatory command-line parameter.”

See also  Can Pepper Content Save The Creator Economy From The AI Monster?

Extra info on each these ransomwares, together with numerous screenshots, in addition to further intelligence on the vulnerabilities used of their assaults, is accessible from Kaspersky.

Source link

Adaptive CrossPlatform Monster ransomwares RedAlert
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How to Use Adaptive Audio and Conversation Awareness on AirPods

January 7, 2026

Adaptive Battery Management Lands on the iPhone in iOS 26

June 12, 2025

Nubia Redmagic 10 Pro review: Mobile gaming monster

December 3, 2024

Apple releases iOS 17.5 with new games in News+, cross-platform tracking detection, more

May 13, 2024
Add A Comment

Comments are closed.

Editors Picks

Apple Is Taking Charlie Brown and Snoopy to the Big City in a New Feature Film

November 8, 2023

Apple partners Goldman Sachs for savings account

October 15, 2022

The Construction Renaissance Is Upon Us

September 21, 2022

JBL Reflect Aero review

July 18, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Sihoo Doro C300 and C300 Pro V2 office chair reviews: Affordable, comfortable ergonomics

Xiaomi 17 Ultra review: A balancing act

6 Common Mistakes to Avoid When Selling a Used CPU (2026 Guide)

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.