This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Friday 21st May 2021
BLOG: Microsoft Informs About Data Stealing Malware That Acts As Ransomware
Microsoft issued a warning on Thursday May 20th about a large “email campaign” that’s issuing a Java-based STRRAT malware that steals personal data from contaminated and hijacked systems while masquerading as a ransomware infection.
The Microsoft Security Intelligence team stated that this RAT is infamous for its ransomware-like behaviour of appending the file name extension ‘.crimson’ to files without actually encrypting them. The new movement of cyberattacks was spotted by the company last week, the attacks originates with spam emails sent from the compromised email accounts with “Outgoing Payments” in the subject line, then the recipients are encouraged to open malicious PDF documents that claim to be transfers, but instead connects to a rogue domain to download the STRRAT malware.
Besides establishing connections to a command-and-control server during execution, the malware comes with a range of features that allow it to collect browser passwords, log keystrokes, and run remote commands and PowerShell scripts.

STRRAT was first noticed in the threat landscape in June 2020 by German cybersecurity firm G Data observing the Windows malware (version 1.2) in phishing emails containing malicious Jar/Java Archive attachments. The RAT has a emphasis on stealing records of browsers and email clients, and passwords via keylogging.
Its ransomware capabilities are at best rudimentary in that the “encryption” stage only renames files by suffixing the “.crimson” extension. “If the extension is removed, the files can be opened as usual,” Kahn added.
Microsoft observes that version 1.5 is more complicated and flexible than prior editions, this suggests that the attackers following the procedure are aggressively working to manage their toolset. The hoax encryption behaviour remains unchanged, which suggests that the group may be aiming to make quick money off unsuspecting users through the use of extortion/coercion.
Get our latest cyber intelligence insights straight into your inbox every week
Fill out the short form below to subscribe to our newsletter so that you never miss out on our cyber intelligence insights and news.