Noberus ransomware actors are adding weapons to their malware to steal data and credentials from victim networks.
Revised version of the Exmatter data exfiltration tool was seen used with Noberus in ransomware infections, and affiliate using Noberus was detected using Eamfo, the info-stealing malware that connects to the SQL database where a victim’s Veeam backup software installation stores credentials.
The RaaS group Coreid thought to be behind Noberus and its affiliates makes the threat more dangerous than ever as per the Symantec researchers and is known for using the Carbanak malware to steal money, particularly in the banking, hospitality, and retail industries.
Noberus also known as BlackCat and ALPHV is the successor to those malware families. Coreid has continuously updated Noberus since it first emerged, shortly after BlackMatter was retired in a suspected move by the ransomware gang to stay ahead of law enforcement.
Noberus is written in Rust, that can encrypt files on a range of OS and environments, including Windows, VMware ESXi, Debian Linux, and ReadyNAS and Synology storage, Coreid has claimed. The number of victims are likely to be higher.
With the code getting a major update, that includes encryption capabilities on Arm systems, and SAFEMODE, which added more encryption functionality to its Windows build.
Exmatter is being used with BlackMatter. But the data exfiltration tool has been updated and with the latest version being used with the Noberus attacks reducing the number of file types it tries to steal and adding a range of new features.
The Eamfo info-stealer may have been used by attackers alongside the Yanluowang and LockBit ransomware families, as well as a new ransomware variant called Monti.
Eamfo connects to a victim’s Veeam software’s SQL database and steals the credentials through a SQL query. Also Veeam vulnerabilities are exploited to steal more information once the attacker came in to the network.
The Noberus attacks that include Eamfo also use GMER, an old rootkit scanner used by ransom groups to kill processes in compromised systems. It’s been used widely now.
Indicators of Compromise