Ransomware Targeting Albania Using Stolen Certificates To Sign Malware


  • ransom-4


The threat actors targeting Albanian organizations with ransomware and wiper malware have updated portions of their malware delivery operations.

In both the first and second wave of attacks the ransomware uses a code signing certificate, which was most likely stolen from a Kuwait Telecommunications Company.

In early deployments, the wiper malware and raw disk driver made use of a signed third-party loader, a signed loader for unsigned drivers, to deploy the raw disk driver and obtain access the raw disk on the machine.

However, in the second wave, the threat actors made use of a leaked Nvidia code signing certificate to sign the wiper malware which now has the modified raw disk driver embedded into the signed payload.

SkyWatchSM Alert Legend

  • small-bell


  • active-threat0-lt-green

    Active Threat

  • malware-lt-green


  • ransome-lt-green


  • warning-green


  • file-green


Glesec Information Sharing Protocol

GLESEC CYBER SECURITY INCIDENT REPORTS are in compliance with the U.S. Department of Homeland Security (DHS) Traffic-Light Protocol (TLP).

  • TLP-White

    Disclosure is Not Limited.

  • TLP-Green

    Limited Disclosure, Restricted Only to the Community.

  • TLP-Amber

    Limited Disclosure, restricted to the Participant's Organization.

  • TLP-Red

    Not for Disclosure, Restricted/ Classified - Only Shared with US DHS.

Discover Glesec.

Authority. Consistency.

Sign-up today for SkywatchSM Alerts.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.