ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool 3AM

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: 3AM

Names3AM
CategoryMalware
TypeRansomware, Big Game Hunting
Description(Symantec) A new ransomware family calling itself 3AM has emerged. To date, the ransomware has only been used in a limited fashion. Symantec’s Threat Hunter Team, part of Broadcom, has seen it used in a single attack by a ransomware affiliate that attempted to deploy LockBit on a target’s network and then switched to 3AM when LockBit was blocked.

3AM is written in Rust and appears to be a completely new malware family. The ransomware attempts to stop multiple services on the infected computer before it begins encrypting files. Once encryption is complete, it attempts to delete Volume Shadow (VSS) copies. It is still unclear whether its authors have any links to known cybercrime organizations.
Information<https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit>

Last change to this tool card: 12 October 2023

Download this tool card in JSON format

Previous: 3102 RAT
Next: 3PARA RAT

All groups using tool 3AM

ChangedNameCountryObserved

APT groups

XLockBit Gang[Unknown]2019-Apr 2024 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]