The Real Story of “The Order”
The new film about an FBI agent chasing a white supremacist terror cell is based on a true story—and one that connects the headlines of 30 years ago to those of today.
Security Latest – Read More
The new film about an FBI agent chasing a white supremacist terror cell is based on a true story—and one that connects the headlines of 30 years ago to those of today.
Security Latest – Read More
Supply chain software platform Blue Yonder, owned by Panasonic, said it was working to get customer systems back online. A cybercrime group known as Termite claimed it had 680 gigabytes of stolen data.
The Record from Recorded Future News – Read More
Personalized search results seem to be on the rise. If you’re concerned about privacy, you can turn it off – for a single search, or for good.
Latest stories for ZDNET in Security – Read More
An Israeli startup specializing in penetrating IoT devices says it’s hiring to “support new business growth” in the US government market.
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More

The ransomware attack that hit supply chain management platform Blue Yonder and its customers last month was the work of a new ransomware group called “Termite.”
Cyble Research and Intelligence Labs (CRIL) researchers have examined a Termite ransomware binary and determined that Termite is essentially a rebranding of the notorious Babuk ransomware. The Termite leak site claims seven victims so far (geographic distribution below).

We’ll cover the technical details of the new Termite ransomware strain, which was first identified by PCrisk, along with MITRE ATT&CK techniques, indicators of compromise (IoCs) and recommendations.
Upon execution, the ransomware invokes the SetProcessShutdownParameters(0, 0) API to ensure that its process is one of the last to be terminated during system shutdown. This tactic is used to maximize the time available for the ransomware to complete its encryption process.
The ransomware then attempts to terminate services on the victim’s machine to prevent interruptions during the encryption process. It uses the OpenSCManagerA() API to establish a connection with the Service Control Manager, granting access to the service control manager database (image below).

After gaining access, the ransomware enumerates the services on the victim’s machine to retrieve their names. It specifically looks for services such as veeam, vmms, memtas and others, and terminating them if they are found to be actively running.
The ransomware enumerates running processes using the CreateToolhelp32Snapshot(), Process32FirstW(), and Process32NextW() APIs. It checks process names such as sql.exe, oracle.exe, firefox.exe and others and terminates them if they are actively running.

After that, the ransomware launches the vssadmin.exe process to delete all Shadow Copies, as shown in the below figure. This action is performed to prevent system recovery after the files have been encrypted.

The ransomware also uses the SHEmptyRecycleBinA() API to delete all items from the Recycle Bin, ensuring that no deleted files can be restored after encryption. After execution, Termite Ransomware attempts to retrieve system information using the GetSystemInfo() API, which collects details like the number of processors, as shown in the below figure.

The ransomware then creates a separate thread for each detected CPU, generates ransom notes named “How To Restore Your Files.txt”, and encrypts files on the victim’s machine.
It avoids encrypting certain system folders such as AppData, Boot, Windows, Windows.old etc. Additionally, it specifically excludes system files such as autorun.inf, boot.ini, bootfont.bin etc., as well as file extensions like .exe, .dll, and .termite from the encryption process to ensure that essential system functions remain intact.
Similar to Babuk ransomware, Termite appends the signature “choung dong looks like hot dog” at the end of the encrypted file.

The figure below shows the ransom note dropped by the ransomware, titled ” How To Restore Your Files.txt,” which instructs victims to visit the onion site for additional information.

After dropping the ransom notes, the malware encrypts the files on the victim’s machine and appends the “.termite” extension, as shown in the figure below.

The Termite ransomware can also spread through network shares and paths of the infected machine, as shown below.

If the command-line argument is “shares,” the ransomware uses the NetShareEnum() API to locate network shares and retrieve information about each shared resource on the server. It then checks for the $ADMIN share and begins encrypting the files. If the command-line argument is “paths,” the ransomware calls the GetDriveTypeW() API to identify network drives connected to the infected machine, and once located, it starts encrypting the files. If neither “-paths” nor “-shares” are provided, and the mutex named “DoYouWantToHaveSexWithCuongDong” is not found on the infected machine, the ransomware recursively traverses all local drives and encrypts the files.
Termite ransomware represents a new and growing threat in the cyber landscape, leveraging advanced tactics such as double extortion to maximize its impact on victims. By targeting businesses and demanding substantial ransoms, it not only disrupts operations but also exposes organizations to significant financial, legal, and reputational risks. The emergence of Termite underscores the critical need for robust cybersecurity measures, proactive threat intelligence, and incident response strategies to counter the evolving tactics of ransomware groups.
We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices below:
Safety Measures to Prevent Ransomware Attacks
| Tactic | Technique | Procedure |
| Execution | T1204.002 (User Execution) | User executes the ransomware file |
| Defense Evasion | T1070.004 (Indicator Removal: File Deletion) | Ransomware deletes itself after execution |
| Discovery | T1083 (File and Directory Discovery) | Ransomware enumerates folders for file encryption and file deletion. |
| Discovery | T1135 (Network Share Discovery) | Targets Network Shares and Paths |
| Impact | T1486 (Data Encrypted for Impact) | Ransomware encrypts the data for extortion. |
| Impact | T1490 (Inhibit System Recovery) | Disable automatic Windows recovery |
| Indicators | Indicator Type | Description |
| f0ec54b9dc2e64c214e92b521933cee172283ff5c942cf84fae4ec5b03abab55 | SHA-256 | Termite Ransomware |
The post A Technical Look at the New ‘Termite’ Ransomware that Hit Blue Yonder appeared first on Cyble.
Blog – Cyble – Read More
Remington Ogletree, a 19-year-old resident of Texas and Florida, is at least the sixth alleged member of the Scattered Spider hacking collective to have federal charges filed against them in recent months.
The Record from Recorded Future News – Read More
Recent targets of the RedLine info-stealing malware include Russian businesses that are looking for cracked copies of corporate software, researchers say.
The Record from Recorded Future News – Read More
A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year.
The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab.
“The spyware placed on his device allows the operator to track a target device’s
The Hacker News – Read More
A second round vote was scheduled for this Sunday, a runoff between a little-known far-right candidate and the liberal Elena Lasconi, but will now not take place.
The Record from Recorded Future News – Read More
Inconsistent data laws across the world are pushing organizations to think of diplomatic privacy solutions.
Latest stories for ZDNET in Security – Read More