Powered by MOMENTUM MEDIA
cyber daily logo
Breaking news and updates daily. Subscribe to our Newsletter

LockBit may be using TeamViewer in its ransomware attacks

Researchers spot a popular remote access tool being used to deploy ransomware.

user icon David Hollingworth
Fri, 19 Jan 2024
LockBit may be using TeamViewer in its ransomware attacks
expand image

Security researchers from Huntress have observed a pair of ransomware attempts that appear to have used TeamViewer to gain initial access to targeted systems.

Huntress’ people spotted the activity after a small number of ransomware canary files – files deployed to alert security systems to encryption attempts – on the impacted systems were encrypted by ransomware, which appears to be similar to that used by the LockBit gang in the past.

In both instances, Huntress was able to use TeamViewer log files to measure the time the bad guys spent on each system. One session lasted just seven and a half minutes, while the second – which was stopped by security software installed on the system – lasted a bit over 10 minutes.

============
============

Both access attempts came from the same specific endpoint, and both began initial deployment from a DOS batch file on the affected system’s desktop. In the second instance, where the deployment was stopped, the threat actor tried multiple times to get around the security software and launch an executable called LB3.exe – likely standing for LockBit 3.0, the gang’s full name.

The file and another file curiously called ZZZZZZZ were both eventually quarantined by the security software, after which the threat actor appears to have given up.

According to Huntress, keeping track of what software is installed on your machines is just as important as any physical inventory.

“Basic security measures are predicated on an asset inventory, of not just physical and virtual endpoints, but also of installed applications,” said Huntress researcher Harlan Carvey in a blog post.

“This – and previous incidents observed by Huntress SOC analysts – clearly demonstrate that threat actors look for any available means of access to individual endpoints to wreak havoc and possibly extend their reach further into the infrastructure.”

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.