Luna deploys malware written in Rust – its cross-platform capabilities allow the group to aim at Windows, Linux and ESXi systems all at once. The advertisement on the dark web, spotted by Kaspersky, states that Luna only works with Russian-speaking affiliates. Moreover, the ransom note hardcoded into the binary contains some spelling mistakes – driving towards the conclusion that the group might be Russian-speaking. Since Luna is a newly discovered group, there’s still little data on its victimology – but Kaspersky are actively following Luna's activity.
Luna underlines the recent trend for cross-platform ransomware, with languages like Golang and Rust being heavily implemented by modern ransomware gangs in the past year. A notable example includes BlackCat and Hive, the latter using both Go and Rust. These languages are platform independent, so the ransomware written using them can be easily ported from one platform to another. The attacks can then be aimed at multiple operating systems at the same time.
Another investigation recently conducted by Kaspersky provides deeper insight into ransomware actor Black Basta’s activity. This group executes a new ransomware variant written in C++ which first came to light in February 2022. Since then, Black Basta has managed to attack more than 40 victims, mainly in the United States, Europe and Asia.
As Kaspersky’s investigation has shown, both Luna and Black Basta are targeting ESXi systems, as well as Windows and Linux, which is yet another ransomware trend of 2022. ESXi is a hypervisor that can be used independently on any operating system. Since many enterprises have migrated to virtual machines based on ESXi, it has become easier for the attackers to encrypt the victims’ data.
“The trends we outlined earlier this year seem to be gaining steam. We see more and more gangs using cross-platform languages for writing their ransomware. This enables them to deploy their malware on a variety of operating systems. The increased attacks on ESXi virtual machines is alarming and we expect more and more ransomware families to deploy the same strategy,” comments Jornt van der Wiel, a security expert at Kaspersky.
Learn more about the emerging ransomware groups on Securelist.
To protect yourself and your business from ransomware attacks, consider following these rules proposed by Kaspersky:
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.