{"id":15667,"date":"2023-07-04T13:10:28","date_gmt":"2023-07-04T13:10:28","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=15667"},"modified":"2024-12-20T23:44:17","modified_gmt":"2024-12-20T23:44:17","slug":"redenergy-stealer-as-a-ransomware","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/redenergy-stealer-as-a-ransomware\/","title":{"rendered":"RedEnergy Stealer-as-a-Ransomware On The Rise"},"content":{"rendered":"<p>Researchers have discovered a new form of malware called RedEnergy Stealer. It is <strong>categorized as Stealer-as-a-Ransomware<\/strong> but is not affiliated with the Australian company Red Energy.<\/p>\n<p>A malware called RedEnergy stealer uses a <strong>sneaky tactic to steal sensitive data<\/strong> from different web browsers. Its fundamental spreading way <a href=\"https:\/\/gridinsoft.com\/pop-ups\">circulates fake updates \u2013 pop-ups<\/a> and banners that bait the user to install what appears to be the malicious payload. RedEnergy also has multiple modules that <strong>can carry out ransomware activities<\/strong>. Despite using common method names, the malware has kept its original name. RedEnergy is classified as Stealer-as-a-Ransomware because<a href=\"https:\/\/gridinsoft.com\/blogs\/infostealer-malware-top\/\"> it can function as a stealer<\/a> and ransomware.<\/p>\n<figure id=\"attachment_15676\" aria-describedby=\"caption-attachment-15676\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Screen-of-VirusTotal-site-1024x539.webp\" alt=\"What kind of malware is RedEnergy Stealer?\" width=\"750\" height=\"395\" class=\"size-large wp-image-15676\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Screen-of-VirusTotal-site-1024x539.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Screen-of-VirusTotal-site-300x158.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Screen-of-VirusTotal-site-768x404.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Screen-of-VirusTotal-site.webp 1366w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-15676\" class=\"wp-caption-text\">Detection names on VirusTotal site<\/figcaption><\/figure>\n<h2>What is RedEnergy Malware?<\/h2>\n<p>RedEnergy is a malware designed to <strong>appear as a legitimate browser update<\/strong>, tricking users into downloading and installing it. It imitates well-known browsers like Google Chrome, Microsoft Edge, Firefox, and Opera, and once triggered, it deposits four files (two temporary files and two executables) onto the targeted system. One of these files contains a malicious payload and <strong>initiates a background process<\/strong>. The load displays an insulting message to the victim once executed.<\/p>\n<figure id=\"attachment_15675\" aria-describedby=\"caption-attachment-15675\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Infection-chain_790x400px.webp\" alt=\"RedEnergy Malware\" width=\"790\" height=\"400\" class=\"size-full wp-image-15675\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Infection-chain_790x400px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Infection-chain_790x400px-300x152.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Infection-chain_790x400px-768x389.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-15675\" class=\"wp-caption-text\">RedEnergy Infection chain<\/figcaption><\/figure>\n<p>Also, RedEnergy is malicious software that <strong>remains on an infected system even after restart<\/strong> or shutdown. This allows it to continue its harmful activities uninterrupted. As part of its operation, it also encrypts the victim&#8217;s data and adds the &#8220;<strong>.FACKOFF!<\/strong>&#8221; extension to all the encrypted files. It then demands payment from the victim to restore access to the files through a ransom message (&#8220;<strong>read_it.txt<\/strong>&#8220;) and changes the desktop wallpaper.<\/p>\n<figure id=\"attachment_15678\" aria-describedby=\"caption-attachment-15678\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-files-1024x494.webp\" alt=\"Encrypted Files by RedEnergy\" width=\"750\" height=\"362\" class=\"size-large wp-image-15678\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-files-1024x494.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-files-300x145.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-files-768x370.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-files.webp 1246w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-15678\" class=\"wp-caption-text\">Encrypted files with .FACKOFF! extension<\/figcaption><\/figure>\n<p>One of the things that the ransomware does is delete data from the shadow drive, which means that any backups are erased. In addition, the malicious software changes the <code>desktop.ini<\/code> file, which <strong>contains basic settings for file system folders<\/strong>. By doing this, RedEnergy can alter the appearance of the folders, making it easier to hide its activities on the system. Lastly, RedEnergy can also steal data from different web browsers, potentially <strong>giving it access to personal information<\/strong>, login details, financial data, online activities, session-related information, and other essential data.<\/p>\n<h3>Threat Summary<\/h3>\n<div class=\"su-table su-table-alternate\">\n<table>\n<tbody>\n<tr>\n<td><strong>Name<\/strong>\n       <\/td>\n<td>RedEnergy Stealer-as-a-Ransomware\n       <\/td>\n<\/tr>\n<tr>\n<td><strong>Threat Type<\/strong>\n       <\/td>\n<td>Information stealer, ransomware\n       <\/td>\n<\/tr>\n<tr>\n<td><strong>Encrypted Files Extension<\/strong>\n       <\/td>\n<td>.FACKOFF!\n       <\/td>\n<\/tr>\n<tr>\n<td><strong>Ransom Demanding Message<\/strong>\n       <\/td>\n<td>read_it.txt\n       <\/td>\n<\/tr>\n<tr>\n<td><strong>Cyber Criminal Contact<\/strong>\n       <\/td>\n<td>georger1212@proton.me\n       <\/td>\n<\/tr>\n<tr>\n<td><strong>Ransom Amount<\/strong>\n       <\/td>\n<td>0.005 BTC\n       <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>How does RedEnergy Malware work?<\/h2>\n<p>This threat campaign uses a <strong>deceitful redirection technique to trick users<\/strong>. When users try to access the targeted company&#8217;s website through their LinkedIn profile, they are <strong>unknowingly sent to a malicious website<\/strong>. On this website, they are asked to download what seems like a legitimate browser update, presented as four different browser icons. However, this is a trap, and the unsuspecting user downloads an executable file called RedStealer instead of an actual update.<\/p>\n<figure id=\"attachment_15680\" aria-describedby=\"caption-attachment-15680\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site-1024x400.webp\" alt=\"How does RedEnergy Malware work?\" width=\"750\" height=\"293\" class=\"size-large wp-image-15680\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site-1024x400.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site-300x117.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site-768x300.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site-1536x600.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site-1568x613.webp 1568w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Malicious-download-site.webp 1600w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-15680\" class=\"wp-caption-text\">Example of Malicious download site<\/figcaption><\/figure>\n<p>A deceptive threat campaign uses a <strong>misleading download domain<\/strong> called <code>www[.]igrejaatos2[.]org<\/code>. The domain appears as a ChatGpt site, but it&#8217;s counterfeit and aims to trick victims into downloading a fake offline version of ChatGpt. Unfortunately, the <strong>zip file contains the same malicious executable<\/strong> as before, and victims unknowingly acquire it upon downloading.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"RedEnergy Stealer-as-a-Ransomware On The Rise\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n<h2>How to avoid installation of RedEnergy Malware?<\/h2>\n<p>Individuals and organizations must exercise <strong>extreme caution when accessing websites<\/strong>, particularly those linked to LinkedIn profiles. Verifying browser updates&#8217; authenticity and being wary of <strong>unexpected file downloads<\/strong> are paramount to protecting against such malicious campaigns.<\/p>\n<p>To prevent negative consequences, there are several essential steps to take:<\/p>\n<ul>\n<li>Updating your operating system and software regularly.<\/li>\n<li>Essential to be cautious when dealing with email attachments or suspicious links, especially from unknown sources.<\/li>\n<li>Consider using reliable antivirus or anti-malware software to provide extra protection and conduct regular system scans.<\/li>\n<li>Avoid downloading files from untrusted websites and be wary of pop-up ads or misleading download buttons that may contain harmful content.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have discovered a new form of malware called RedEnergy Stealer. It is categorized as Stealer-as-a-Ransomware but is not affiliated with the Australian company Red Energy. A malware called RedEnergy stealer uses a sneaky tactic to steal sensitive data from different web browsers. Its fundamental spreading way circulates fake updates \u2013 pop-ups and banners that [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":15687,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15,17],"tags":[28,55,1360],"class_list":{"0":"post-15667","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"category-labs","9":"tag-malware","10":"tag-ransomware","11":"tag-stealer"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_banner_RedEnergy-Stealer-as-a-Ransomware_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=15667"}],"version-history":[{"count":24,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15667\/revisions"}],"predecessor-version":[{"id":28884,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15667\/revisions\/28884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/15687"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=15667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=15667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=15667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}