KageNoHitobito Ransomware Attacking Windows Users | #ransomware | #cybercrime

A new ransomware named KageNoHitobito has been targeting Windows users across various countries.

It encrypts their data and demands a ransom through sophisticated means.

This article delves into the mechanics of the KageNoHitobito ransomware and its attack methodology and provides a brief overview of another emerging threat, the DoNex ransomware.

Infection Vector/Victimology

The KageNoHitobito ransomware has been identified in multiple countries, including Chile, China, Cuba, Germany, Iran, Lithuania, Peru, Romania, Sweden, Taiwan, the United Kingdom, and the United States.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

The widespread distribution suggests that the ransomware may have been disseminated through file-sharing services, masquerading as legitimate software or game cheats.

Thus, users were tricked into downloading and executing malicious files.

Files encrypted by the KageNoHitobito ransomware

According to a recent report by Fortinet, KageNoHitobito ransomware is targeting Windows users across the globe.

The attack is designed to exploit Windows system vulnerabilities, leading to compromised security and potential data loss.


Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:

Attack Method

KageNoHitobito is designed to encrypt files on local drives, appending a “.hitobito” extension to the encrypted files.

It strategically avoids encrypting critical system files such as .dat, .dll, .exe, .ini, .log, and .sys to ensure the system remains operational, presumably to facilitate communication with the victim for ransom negotiations.

The ransomware displays a ransom note on the victim’s desktop and drops a text-based note, urging victims to contact the attackers via a TOR site using the AbleOnion chat platform.

Interestingly, the chat platform does not seem dedicated solely to ransom negotiations, indicating a possible use of a public or shared platform to avoid detection.

KageNoHitobito ransomware’s ransom note displayed on the victim’s desktop

DoNex Ransomware Overview

Parallel to the KageNoHitobito, another ransomware named DoNex has been making rounds since early March 2024.

Unlike KageNoHitobito, DoNex has a data leak site and has been reported to encrypt files on both local and network drives.

The ransomware is highly configurable, allowing it to adapt its operations based on the environment it infects.

DoNex ransomware’s configuration file

DoNex avoids encrypting a wide range of file extensions and specific critical system folders, ensuring the system’s usability post-infection.

It also terminates various processes and services, enhancing its ability to encrypt files without interference.

Files encrypted by the DoNex ransomware

The ransom note of DoNex shares similarities with another ransomware, DarkRace, suggesting a possible link between the two in terms of their origin or the threat actors behind them.

The DoNex ransomware’s ransom note

Both KageNoHitobito and DoNex ransomware represent significant threats to global cybersecurity.

Their sophisticated attack methods and international reach highlight the need for increased vigilance and robust cybersecurity measures among users and organizations worldwide.


SHA2 Note
8939bfe20bc6476806d22c8edfcaba5c36f936b893b3de1c847558502654c82f Hitobito ransomware
0adde4246aaa9fb3964d1d6cf3c29b1b13074015b250eb8e5591339f92e1e3ca DoNex ransomware
74b5e2d90daaf96657e4d3d800bb20bf189bb2cf487479ea0facaf6182e0d1d3 DarkRace ransomware(predecessor of DoNex)

Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

Source link


National Cyber Security