How Are Embargo Ransomware Actors Abusing Safe Mode to Bypass Security?

ESET researchers have recently identified a new tactic employed by Embargo ransomware actors to disable security solutions by exploiting Safe Mode, which is typically used as a diagnostic environment for troubleshooting system issues. Safe Mode usually loads only the essential drivers and services required to run the system, providing a minimal environment for system repair. However, Embargo ransomware actors seize this limited functionality to bypass security measures and deploy their ransomware effectively.

Discovery and Initial Strategy

MDeployer and Scheduled Task

The emergence of the Embargo ransomware was first detected in June 2024. This ransomware is part of a broader ransomware-as-a-service (RaaS) operation that focuses specifically on U.S. companies. The attack begins with the deployment of MDeployer, a malicious loader developed in Rust. MDeployer gets activated through a scheduled task innocuously labeled “Perf_sys.” This task decrypts encrypted cache files using an RC4 encryption key and subsequently loads MS4Killer, another Rust-based tool designed to disable endpoint security measures.

BYOVD Technique

MS4Killer employs an advanced tactic known as "Bring Your Own Vulnerable Driver" (BYOVD) to disable security solutions. It leverages a compromised signed driver named “probmon.sys” to evade detection and block security software from functioning. Exploiting such vulnerabilities allows the malware to operate under the radar, essentially neutralizing any active defensive measures. Once the security solutions are disabled, MDeployer launches the Embargo ransomware payload, which encrypts files on the target system.

The Ransomware Process

File Encryption and Ransom Note

When the ransomware is activated, it encrypts a variety of files and appends them with random six-letter hexadecimal extensions. This effectively corrupts the data, rendering it inaccessible without the corresponding decryption key. Simultaneously, the ransomware deposits a ransom note named "HOW_TO_RECOVER_FILES.txt" in each affected directory, which instructs victims on how to pay the ransom to recover their files. Additionally, the ransomware creates a mutex called “IntoTheFloodAgainSameOldTrip” for system synchronization, ensuring that only one instance of the malware runs at a time.

Double Extortion Tactics

Embargo ransomware operators also use a double extortion strategy, a tactic where they threaten to release stolen data if the ransom is not paid. The actors communicate through their own infrastructure and the secure Tox protocol, adding another layer of complexity to their operations. This dual threat puts additional pressure on victims, making them more likely to pay the ransom to avoid the public exposure of sensitive information.

Advanced Encryption and Process Manipulation

XOR Encryption and Custom Decryption

MS4Killer utilizes advanced encryption strategies to obscure the critical components in its binary code. This complexity is achieved using the XOR cipher, a method of encryption that alters the binary data to make it unreadable without the correct decryption key. The malware employs a custom decryption function to reveal these components when needed. It also manipulates processes through the Windows API "OpenProcessToken" to gain the necessary permissions to execute its tasks without raising suspicions.

Driver Storage and Monitoring

The malware stores the vulnerable driver “probmon.sys” in two designated locations, securing it further with RC4 and XOR encryption. By monitoring and terminating security software processes, MS4Killer ensures that it can operate uninterrupted. This is done using the “SeLoadDriverPrivilege” for managing the driver and the “CreateServiceW” API to create and manage services as needed. Through strategic registry modifications, the malware maintains its presence and ensures the continued success of the attack.

Conclusion

ESET researchers have recently uncovered a new strategy being used by Embargo ransomware operators to disable security software by taking advantage of Safe Mode. Typically, Safe Mode is utilized as a diagnostic tool to help troubleshoot and fix system problems, as it only loads essential drivers and services needed to run the operating system. This restricted environment is designed to make it easier to address system issues by minimizing the number of running processes. However, Embargo ransomware actors are exploiting this minimalistic setting to circumvent security protocols. By operating within Safe Mode, they effectively bypass the limited security measures and deploy their ransomware more efficiently. This tactic represents a significant challenge for traditional security solutions, which may not be fully operational in Safe Mode and therefore unable to detect or stop the ransomware attack. The discovery highlights the evolving sophistication of cyber threats and the need for enhanced security measures that can operate in all system modes.

Explore more

Why is LinkedIn the Go-To for B2B Advertising Success?

In an era where digital advertising is fiercely competitive, LinkedIn emerges as a leading platform for B2B marketing success due to its expansive user base and unparalleled targeting capabilities. With over a billion users, LinkedIn provides marketers with a unique avenue to reach decision-makers and generate high-quality leads. The platform allows for strategic communication with key industry figures, a crucial

Endpoint Threat Protection Market Set for Strong Growth by 2034

As cyber threats proliferate at an unprecedented pace, the Endpoint Threat Protection market emerges as a pivotal component in the global cybersecurity fortress. By the close of 2034, experts forecast a monumental rise in the market’s valuation to approximately US$ 38 billion, up from an estimated US$ 17.42 billion. This analysis illuminates the underlying forces propelling this growth, evaluates economic

How Will ICP’s Solana Integration Transform DeFi and Web3?

The collaboration between the Internet Computer Protocol (ICP) and Solana is poised to redefine the landscape of decentralized finance (DeFi) and Web3. Announced by the DFINITY Foundation, this integration marks a pivotal step in advancing cross-chain interoperability. It follows the footsteps of previous successful integrations with Bitcoin and Ethereum, setting new standards in transactional speed, security, and user experience. Through

Embedded Finance Ecosystem – A Review

In the dynamic landscape of fintech, a remarkable shift is underway. Embedded finance is taking the stage as a transformative force, marking a significant departure from traditional financial paradigms. This evolution allows financial services such as payments, credit, and insurance to seamlessly integrate into non-financial platforms, unlocking new avenues for service delivery and consumer interaction. This review delves into the

Certificial Launches Innovative Vendor Management Program

In an era where real-time data is paramount, Certificial has unveiled its groundbreaking Vendor Management Partner Program. This initiative seeks to transform the cumbersome and often error-prone process of insurance data sharing and verification. As a leader in the Certificate of Insurance (COI) arena, Certificial’s Smart COI Network™ has become a pivotal tool for industries relying on timely insurance verification.