MalasLocker Ransomware Targets Zimbra Servers, Demands Charity Donations Instead of Ransom

In the ever-evolving landscape of cyber threats, a new player has emerged in the form of MalasLocker ransomware. This notorious ransomware variant has been active since March 2023 and has a distinct modus operandi: instead of demanding traditional ransom payments, it seeks charity donations. This unique twist sets it apart from other ransomware strains and poses a significant challenge for organizations targeted by this malicious group.

Targeted industries and regions

The MalasLocker group primarily focuses on corporate companies that offer various business services, software solutions, and manufacturing services. While their attacks have been observed in multiple regions, they appear to have a particular interest in targeting organizations in Italy, Russia, and the United States. This geographical spread highlights their international reach and emphasizes the need for heightened vigilance in these areas.

Method of attack

The threat actors behind MalasLocker employ sophisticated phishing techniques to target their victims. They distribute malicious JSP documents via phishing emails, specifically targeting users of Zimbra, a popular collaboration software suite. By enticing unsuspecting recipients to open these infected documents, the attackers gain unauthorized access to the victims’ systems.

Specific file upload locations

To further their nefarious objectives, the MalasLocker group uploads suspicious JSP files to specific directories within Zimbra servers. These files, such as heartbeat.jsp, info.jsp, and Startup1_3.jsp, are typically found in directories like /opt/zimbra/jetty_base/webapps/zimbra/ or /opt/zimbra/jetty/webapps/zimbra/public. This strategic placement allows the ransomware to propagate throughout the system, encrypting critical files and wreaking havoc on the victims’ infrastructure.

Exploiting Zimbra vulnerabilities

In addition to leveraging phishing techniques, the MalasLocker group takes advantage of vulnerabilities associated with Zimbra servers. These vulnerabilities include CVE-2022-27924 (Zimbra memcache command injection), CVE-2022-27925 (Zimbra admin directory traversal), CVE-2022-30333 (UnRAR Linux/UNIX directory traversal), and CVE-2022-37042 (Zimbra auth bypass, remote code execution). These vulnerabilities allow the threat actors to gain unauthorized access to the targeted systems. Exploiting these weaknesses gives the ransomware a foothold to carry out its encryption operations.

Encryption Software and File Extensions

To encrypt the victim’s files, the MalasLocker group utilizes the “AGE” encryption tool. Interestingly, they do not append any file extensions to the encrypted files, making it even more challenging for victims to identify the affected files and recover them. This deliberate choice by the attackers adds an extra layer of complexity to the decryption process.

Hosting a Tor website

To communicate with their victims, the MalasLocker group maintains a TOR website. On this site, they have published a list of 160 victims who have fallen prey to the ransomware. To protect the confidentiality of the affected companies, the group has censored the images representing their names. Interestingly, the welcome greeting on the TOR website indicates that the threat group is based in Spain, with a motto written in Spanish that roughly translates to “we are bad… we can be even worse.”

Ransom Note and Contact Details

The ransom note, provided in a file named Readme.txt, takes a unique approach compared to traditional ransom demands. Instead of asking for a specific ransom amount, the MalasLocker group requests charity donations to be made in exchange for the decryptor tools. The note includes instructions on how to make these donations and how to reach the threat group for further communication.

Prevention and best practices

As with any cybersecurity threat, prevention is key when dealing with MalasLocker ransomware. One of the primary measures organizations can take is to regularly patch and update their Zimbra applications to the latest version. Keeping software updated ensures that known vulnerabilities are addressed before threat actors can exploit them. Additionally, implementing robust phishing awareness training programs and maintaining strong email security measures can help mitigate the risk of falling victim to phishing emails.

MalasLocker ransomware represents a new breed of cyber threat that adopts novel tactics to achieve its objectives. By targeting Zimbra servers and demanding charity donations instead of traditional ransom payments, this group poses a significant challenge for organizations worldwide. It is crucial for businesses to stay vigilant, update their software regularly, and implement proactive cybersecurity measures to fend off such attacks. As the threat landscape continues to evolve, organizations must adapt their defenses accordingly to protect their valuable data and infrastructure from these malicious actors.

Explore more

Can You Spot a Deepfake During a Job Interview?

The Ghost in the Machine: When Your Top Candidate Is a Digital Mask The screen displays a perfectly polished professional who answers every complex technical question with surgical precision, yet a subtle, unnatural flicker near the jawline suggests something is deeply wrong. This unsettling scenario became reality at Pindrop Security during an interview with a candidate named “Ivan,” whose digital

Data Science vs. Artificial Intelligence: Choosing Your Path

The modern job market operates within a high-stakes environment where digital transformation has accelerated to a point that leaves even seasoned professionals questioning their specialized trajectory. Job boards are currently flooded with titles that seem to shift shape by the hour, creating a confusing landscape for those entering the technology sector. One listing calls for a data scientist with deep

How AI Is Transforming Global Hiring for HR Professionals?

The landscape of international recruitment has undergone a staggering metamorphosis that effectively erased the traditional borders once separating regional labor markets from the global economy. Half a decade ago, establishing a presence in a foreign market required exhaustive legal frameworks, exorbitant capital investment, and months of administrative negotiations. Today, the operational reality is entirely different; even nascent organizations can engage

Who Is Winning the Agentic AI Race in DevOps?

The relentless pressure to deliver software at breakneck speeds has pushed traditional CI/CD pipelines to a breaking point where manual intervention is no longer a sustainable strategy for modern engineering teams. As organizations navigate the complexities of distributed cloud systems, the transition from rigid automation to fluid, autonomous operations has become the defining challenge for the current technological landscape. This

How Email Verification Protects Your Sender Reputation?

Maintaining a flawless digital communication channel requires more than just compelling copy; it demands a rigorous defense against the invisible erosion of subscriber data that threatens every modern marketing department. Verification acts as a critical shield for the digital infrastructure of an organization, ensuring that marketing efforts actually reach the intended recipients instead of vanishing into the ether. This process