The threat actors targeting Albanian organizations with ransomware and wiper malware have updated portions of their malware delivery operations.
In both the first and second wave of attacks the ransomware uses a code signing certificate, which was most likely stolen from a Kuwait Telecommunications Company.
In early deployments, the wiper malware and raw disk driver made use of a signed third-party loader, a signed loader for unsigned drivers, to deploy the raw disk driver and obtain access the raw disk on the machine.
However, in the second wave, the threat actors made use of a leaked Nvidia code signing certificate to sign the wiper malware which now has the modified raw disk driver embedded into the signed payload.
SkyWatchSM Alert Legend
Glesec Information Sharing Protocol
GLESEC CYBER SECURITY INCIDENT REPORTS are in compliance with the U.S. Department of Homeland Security (DHS) Traffic-Light Protocol (TLP).
Disclosure is Not Limited.
Limited Disclosure, Restricted Only to the Community.
Limited Disclosure, restricted to the Participant's Organization.
Not for Disclosure, Restricted/ Classified - Only Shared with US DHS.