The new version (version 4.0) of the HardBit ransomware<\/a> comes with the Binary Obfuscation Enhancement with passphrase protection. <\/p>\n\n\n\n
HardBit shares several similarities with LockBit Ransomware<\/a>, including group name, image\/icons, fonts, and ransom notes. At this time, it is unclear if there is a link between HardBit and LockBit, experts speculate these similarities may be part of HardBit’s marketing tactics.<\/p>\n\n\n\n
“While the initial attack vector remains unconfirmed at the time of this writing, Cybereason hypothesizes that the threat actors gain an initial foothold into the victim\u2019s environment through brute force of an open RDP and SMB service. In fact, the environment observed multiple login failures from known brute forcing IP addresses.” reads the report<\/strong><\/a> published by Cybereason.<\/em>
Tactics<\/strong> | HardBit 2.0<\/strong><\/td> | HardBit 3.0<\/strong><\/td> | HardBit 4.0<\/strong><\/td><\/tr> |
Disable Windows Defender<\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr> |
Inhibit System Recovery<\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr> |
Packed by Neshta<\/td> | <\/td> | <\/td> | \u2714<\/strong><\/td><\/tr> |
Password protected<\/td> | <\/td> | <\/td> | \u2714<\/strong><\/td><\/tr> |
Stop services<\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr> |
Support HardBit GUI version<\/td> | <\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr> |
Support wiper mode<\/td> | <\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr> |
Use configuration file hard.txt<\/em><\/td> | <\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr> |
Use Ryan-_-Borland_Protector Cracked v1.0<\/em> packer<\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td> | \u2714<\/strong><\/td><\/tr><\/tbody><\/table> The report provides additional info on the ransomware, including the MITRE ATT&CK MAPPING. Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n (<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, malware)<\/strong> |