A new ransomware family dubbed Luna was identified that was written in Rust.
It becomes the third strain to use the language after BlackCat and Hive. There are many operating systems of typed Windows, Linux, ESXi
Luna has been spotted on the dark web through an advertisement on a ransomware forum and used by Russian-speaking malicious actors and not any other threat actors.
Luna’s CLI options are very simple and the program is still in its early stages of development. This can be attributed to the simplicity of its design, which limits the program’s capabilities.
To combine high security and speed, the X25519 ECC and AES are used in the key exchange protocol in this scheme. During this procedure, Curve25519 plays a vital role as one of the key ingredients.
Another ransomware campaign known as Black Basta also discovered by the researchers. This new variant, Black Basta has been around since February 2022 but was only recently discovered.
Each encrypted filename is appended with the .basta extension, and a ransom note is created in each folder with the name readme.txt.
Black Basta can bypass multiple endpoint security solutions by starting up the Windows system in safe mode. The group has managed to attack more than forty different victims within a very short time it had available
As a result of Rust’s platform-agnostic nature, the group behind this new ransomware strain was able to develop and deploy this new strain in a scalable manner.
Luna ransomware also has the capability of evading static code analysis attempts by using a cross platform language.
Its important to stay on top of all developments in the ransomware ecosystem, so one can take appropriate measures to protect the infrastructure.