Site icon TheCyberThrone

RTM Locker Ransomware Linux Variant

Advertisements

Researchers have spotted a new ransomware binary targeting Linux system has been attributed to the ransomware-as-a-service RTM group.

RTM Locker malware is specifically geared toward ESXi hosts, as it has two related commands. Its first access vector stays unknown. Both asymmetric and symmetric encryption make it impossible to decrypt files without the attacker’s private key.

Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware’s leaked source code. It uses a combination of ECDH on Curve25519 (asymmetric encryption) and Chacha20 (symmetric encryption) to encrypt files.

Advertisements

Similarities in the code include methods to generate random numbers. They also share the type of files they encrypt. Finally, both use advanced encryption techniques to make it difficult to recover the encrypted files without the attacker’s private key.

The public key, appended as an extension to (Windows) or at the end of (Linux) the encrypted file, is read to decrypt files. The shared secret is obtained with the attacker’s private key, allowing file decryption.

Despite the technical analysis of the new binaries, however, the security researchers said the initial access vector for RTM Locker is unknown.

The two ESXi commands are:

Both Linux versions encrypt files using the .log,  .vmdk, .vmem, .vswp, and  .vmsn file extensions

Indicators of Compromise

Exit mobile version