Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
Researchers at Trend Micro discovered a new ransomware family that’s being delivered as a fake Google software update – joining the list of a number of malicious campaigns distributing malware disguised as Windows 10, Google Chrome, and Microsoft Exchange updates. HavanaCrypt is a ransomware package presenting itself as a Google software update, despite it being a .NET-compiled application.
HavanaCrypt is difficult to detect because after the ransomware executes, it hides its window by using the ShowWindow function in the system, which gives it a parameter of 0. Also, the ransomware has multiple anti-virtualization check capabilities, as well as a command-and-control server using a Microsoft web hosting service IP address. According to Trend Micro, the ransomware has four stages of checking to see if infected machines are running in a virtualized environment.
Trend Micro also stated that once it’s verified that a victim’s machine is not running in virtual machine, the ransomware downloads a file named “2.txt” from the previously mentioned Microsoft web hosting service IP address. It then saves it as a batch (.bat) file name that has between 20 and 25 random characters.
The batch file contains commands which are used to configure Windows Defender scan preferences to allow detected threats in the “%Windows%” and “%User%” directories. Additionally, before generating a unique identifier based on compromised devices’ system information, the ransomware deploys executable copies as hidden system files in two folders.
Currently, HavanaCrypt deletes backups and interrupts the functions for restoration. It also uses the KeePass password manger code for encryption and uses the QueueUserWorkItem function to speed up the process. To complicate the development of a tool to decrypt data, code from KeePass is used to generate pseudo-random encryption keys.
Although a text file containing the encrypted files is created and encrypted by HavanaCrypt, it doesn’t drop a ransom note. This is an indication that the ransomware may still be in its development phase. Although HavanaCrypt may still be in development, its recommended that cyber security analysts and engineers detect and block the ransomware before it evolves.
Avertium's recommendations
HavanaCrypt ransomware sails in as a fake Google update • The Register
Google Software Update spoofed by new HavanaCrypt ransomware (scmagazine.com)
Fake Google Software Updates Spread New Ransomware (darkreading.com)
Attackers Distribute HavanaCrypt Ransomware Disguised As Updates From Google - Tech News Space
Related Reading: Flash Notice: Zero-Day Google Chrome Type Confusion Vulnerability
Contact us for more information about Avertium’s managed security service capabilities.