
New Crypto24 Ransomware Bypasses EDR Security to Target Large Organizations
A new and alarming ransomware strain, dubbed Crypto24, has emerged, specifically targeting large enterprises with sophisticated techniques designed to bypass modern security measures. This threat represents a significant evolution in ransomware tactics, focusing on stealth and the neutralization of the very tools designed to protect corporate networks.
Unlike many ransomware variants that rely on broad, opportunistic attacks, Crypto24 is used in highly targeted campaigns. Threat actors carefully select their victims, primarily focusing on large organizations with valuable data and the financial capacity to pay substantial ransoms. This “big game hunting” approach allows attackers to invest more resources into breaching a single, high-value target.
What Makes Crypto24 So Dangerous?
The most concerning aspect of this new ransomware is its built-in evasion capability. Crypto24 is specifically engineered to operate under the radar of standard Endpoint Detection and Response (EDR) solutions. EDR tools are a cornerstone of modern enterprise security, designed to monitor endpoint and network events to identify malicious activity in real-time.
Crypto24 circumvents these protections through several clever methods:
- Custom Code: The malware uses unique, custom-written code that does not match the signatures of known threats, allowing it to go undetected by traditional antivirus and some EDR platforms.
- Disabling Security Agents: Before initiating the encryption process, the ransomware actively identifies and attempts to terminate security-related processes and services running on the compromised system.
- Living-off-the-Land Techniques: Attackers may leverage legitimate system administration tools already present on the network to carry out malicious activities, making it difficult for security systems to distinguish between normal and hostile behavior.
By neutralizing these critical security layers, Crypto24 can move laterally across a network, escalate privileges, and encrypt vast amounts of data before an organization’s security team is even alerted to the intrusion.
The Anatomy of a Crypto24 Attack
While the exact initial access vectors may vary, an attack involving Crypto24 typically follows a clear and deliberate pattern:
- Initial Compromise: Attackers gain a foothold in the network through common methods like phishing emails, exploiting unpatched software vulnerabilities, or using stolen credentials.
- Reconnaissance and Lateral Movement: Once inside, the attackers spend time mapping the network, identifying critical assets, domain controllers, and backup systems.
- Security Evasion: The core Crypto24 module is deployed, which immediately works to disable or blind EDR and other security tools.
- Data Exfiltration: In a classic double-extortion tactic, sensitive corporate data is stolen and transferred to an attacker-controlled server before encryption begins. This gives the attackers leverage to threaten a data leak if the ransom is not paid.
- Encryption: With defenses down and valuable data secured, the ransomware begins encrypting files across servers and workstations, appending a unique extension and rendering them inaccessible.
- Ransom Note: A ransom note is left on compromised systems, providing instructions for payment in cryptocurrency in exchange for a decryption key.
How to Protect Your Organization from Advanced Ransomware Threats
Defending against sophisticated threats like Crypto24 requires a proactive, multi-layered security strategy. Relying on a single security solution is no longer sufficient.
- Strengthen Endpoint Security: Ensure your EDR or Extended Detection and Response (XDR) solution is properly configured and monitored. Look for solutions that incorporate behavioral analysis and anti-tampering features to detect and prevent security agent termination.
- Implement a Zero-Trust Architecture: Assume that no user or device is inherently trustworthy. Enforce strict access controls and the principle of least privilege, ensuring users and applications only have access to the resources absolutely necessary for their functions.
- Vulnerability and Patch Management: Consistently patch all systems, software, and applications, especially those that are internet-facing. Many ransomware attacks begin by exploiting known, unpatched vulnerabilities.
- Enhance Monitoring and Threat Hunting: Proactively hunt for threats within your network. Look for signs of unusual activity, such as legitimate tools being used for suspicious purposes or unexpected communication with external IP addresses.
- Immutable Backups: A robust, tested, and immutable backup and recovery plan is your most critical line of defense. Ensure you have offline or air-gapped backups that cannot be encrypted or deleted by attackers who have compromised your primary network.
- Employee Security Training: Educate employees on how to recognize and report phishing attempts. A well-informed workforce is a powerful first line of defense against initial access attempts.
The emergence of Crypto24 is a stark reminder that ransomware actors are continuously innovating. As they develop new ways to bypass security controls, organizations must respond by hardening their defenses and adopting a posture of constant vigilance.
Source: https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/