RedAlert: A Ransomware that Targets Multiple OS Platforms

You are currently viewing RedAlert: A Ransomware that Targets Multiple OS Platforms

 

A new ransomware threat called RedAlert (also known as N13V) has been discovered; it encrypts servers running VMware ESXi under Windows and Linux.

About the malware RedAlert

MalwareHunterTeam found the new ransomware and published many screenshots of its data leak website.

RedAlert is the name of the ransomware because of a string included in the ransom message. However, the attackers are internally referring to their operation as N13V in the Linux encrypter version.

The Linux encryptor is intended to attack VMware ESXi servers, and command-line parameters enable attackers to terminate any virtual machines that are already running before locking data.

RedAlert engages in double-extortion assaults, in which data is taken and then ransomware is used to encrypt machines, much like other enterprise-targeting ransomware operations.

What takes occur next

The ransomware exclusively targets memory data, log files, virtual discs, and swap files that are linked to VMware ESXi virtual machines.

These file formats are encrypted by the ransomware, which also appends the.crypt658 extension to the file names.

The ransomware produces a unique ransom note called HOW TO RESTORE in each folder. It contains information on the stolen data as well as a link to a TOR ransom payment site.

Technical information

One of RedAlert/features N13V’s is the command-line option “-x,” which performs asymmetric cryptography performance testing using various NTRUEncrypt parameter configurations.

The NTRUEncrypt public-key encryption technique, which allows several “Parameter Sets” enabling varying levels of protection, is used by the ransomware during encryption.

The only other ransomware known to employ this encryption technique, aside from RedAlert, is FiveHands.

Conclusion

RedAlert now only lists one organisation as a victim, but that might soon change. Additionally, the fact that Linux and Windows are supported indicates that the virus intends to target a larger attack surface. Therefore, it is advised that enterprises monitor this issue. Always use encryption and appropriate access controls to secure sensitive information.

Leave a Reply