Names | Erebus | |
Category | Exploits | |
Type | Ransomware | |
Description | (Trend Micro) Erebus ransomware (RANSOM_EREBUS.A) first emerged last September 2016 being distributed by malvertisements (malicious advertisements). The malicious ads diverted victims to the Rig exploit kit, which infects the victim's systems with the ransomware. This Erebus variant targets 423 file types, scrambles files with RSA-2048 encryption algorithm, and appends the affected files with the .ecrypt extension. This version of Erebus was observed using compromised websites in South Korea as its command and control (C&C) servers. | |
Information | <https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/erebus-linux-ransomware-impact-to-servers-and-countermeasures> <https://blog.trendmicro.com/trendlabs-security-intelligence/erebus-resurfaces-as-linux-ransomware/> <https://www.bleepingcomputer.com/news/security/erebus-ransomware-utilizes-a-uac-bypass-and-request-a-90-ransom-payment/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/elf.erebus> <https://malpedia.caad.fkie.fraunhofer.de/details/win.erebus> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:erebus> |
Last change to this tool card: 13 May 2020
Download this tool card in JSON format
Previous: EQUATIONLASER
Next: ERMAC
Changed | Name | Country | Observed | ||
APT groups | |||||
Reaper, APT 37, Ricochet Chollima, ScarCruft | 2012-Sep 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |