Users become victims by visiting a deceptive advertisement webpage which uses Fallout and GrandSoft exploit kits to infect, depending on the geolocation and origin. After the exploit kits are accessed, Vidar malware, which was thought to be an Arkei stealer initially, attempts to steal user’s information. Once it runs its course, the GandCrab ransomware then begins operating. The malware itself is sold to hacker groups and can be used in multiple campaigns. Vidar malware will begin its scan based on how its profile was configured. It has the ability to steal credit card numbers and content from Bitcoin wallets as well as other credentials. The information and content are then sent back to the C&C server by using an unencrypted HTTP POST request. GandCrab then encrypts files and places a ransom note on the system’s wallpaper.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security