Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

BlueSky Ransomware Infects KMSAuto Activator users

Kyle by Kyle
July 20, 2022 - Updated on July 22, 2022
in Malware
Reading Time: 2 mins read
0
BlueSky Ransomware backdoors KMSAuto activator
8
SHARES
440
VIEWS
Share on FacebookShare on Twitter

A financially motivated threat actor has been discovered spreading a new ransomware strain, dubbed BlueSky. The group is believed to be connected to the Conti ransomware group.

You might also like

Cybersecurity Crisis Hits Ardent Health Services

China Energy Giant, CEEC, Falls Victim to Rhysida Ransomware Attack

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

CloudSEK’s AI digital risk platform XVigil has discovered the new threat and found that the ransomware is currently targeting organizations and demanding ransom in the form of Bitcoin (BTC).

Bluesky Ransomware breakdown

Bluesky has been seen encrypting the victim’s files with a ‘.bluesky’ extension and then dropping a ransom note via a TXT file.

The researchers have discovered that the ransom is required to be paid in BTC, and have also identified multiple BTC addresses being generated, leading them to believe each victim receives a unique BTC address.

“A Twitter post indicates that one of the BTC addresses has transacted around 1.59 BTC while the other one has no recorded transactions so far,” Cloudsek Added in their report.

Information & analysis – KMSAuto infected

  • BlueSky ransomware was discovered in the wild with a filename of ‘javaw.exe’ and was 71KB.
  • ‘javaw.exe’ was dropped by a PowerShell script named ‘2.ps1‘ which was 16.84KB.
  • After further investigation, the researchers discovered that 2.ps1 opened communications with a domain pretending to be an old Windows activation too called “KMSAuto Net Activator“.
Fake KMSAuto website spreading the Bluesky Ransomware
A screenshot of the website impersonating the KMS Auto activator

The malicious PowerShell file contacts a server run by the threat actors with the domain kmsauto.us and downloads a file hxxp://kmsauto.us/someone/l.exe.

The “someone” directory in the web address contains multiple executables including the BlueSky Ransomware. The other executables include:

  • JuicyPotato
  • CVE-2022-21882
  • CVE-2020-0796 aka SMBGhost

Ransomware operator

After the researchers discovered the new ransomware strain, they pulled the Whois and DNS records providing them with a registration email and phone number associated with the domain name.

The researchers then discovered the phone number was associated with the Krasnodar region in Russia and has an active WhatsApp account.

Bluesky operators whatsapp account
The WhatsApp account associated with the ransomware operators, source: CloudSek

Researching the domain’s activity revealed that the last edit was done in 2021, only a year after the domain was registered.

Bluesky ransomware operators
Details on the registered email to the Kmsauto domain. Source, Cloudsek

The website operator most likely originates from Russia due to these findings:

  • They have social media mentions on VK which is the largest Russian line media and social networking service.
  • The following pages on the website contain Russian words which loosely translate to criminal, religion, and economy.
    • https[:]//kmsauto[.]us/v-mire/
    • https[:]//kmsauto[.]us/kriminal/
    • https[:]//kmsauto[.]us/religiya/
    • https[:]//kmsauto[.]us/ekonomika/

Linked in Conti Ransomware?

Cloudsek suspects that BlueSky has some connection with the Conti ransomware due to the malware being tagged along with Conti on file analysis and sample sharing sites. The two groups share common file signatures as well.

Bluesky conti ransomware similarities
BlueSky & Conti ransomware similarities, source, Cloudsek
Tags: BlueSkyContiransomware
Kyle

Kyle

Co-owner, writer, and editor at ZeroSecurity. Security, Blockchain, and SEO enthusiast. "Formal education will make you a living; self-education will make you a fortune."

Recommended For You

Crisis at Ardent Health: Ransomware attack disrupts operations, forcing patient diversions. The Tennessee-based provider initiates cybersecurity measures.

Cybersecurity Crisis Hits Ardent Health Services

November 27, 2023
State-owned China Energy Engineering Corp (CEEC) hit by Rhysida ransomware; global alert issued. Insights into tactics and impact on #StopRansomware effort

China Energy Giant, CEEC, Falls Victim to Rhysida Ransomware Attack

November 26, 2023

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

November 21, 2023

Boeing Faces Cybersecurity Crisis: Lockbit Ransomware Attack Exposes Sensitive Data Amid Citrix Vulnerability Concerns

November 13, 2023

New Variant of Jupyter Malware On The Rise

November 10, 2023

IBM X-Force Unearths New Gootloader Variant, “GootBot”

November 8, 2023
Next Post
New iOS and iPadOS update pushed to fix zero-day bugs

New iOS and iPadOS update pushed to fix zero-day bugs

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

FBI dismantles IPStorm botnet, arrests Sergei Makinin, ending a 4-year cybercrime spree. A major win against global online threats.

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

November 21, 2023
Researchers Expose Gaza Charity Crypto Scam

Researchers Expose Gaza Charity Crypto Scam

November 20, 2023
Global success: Europol, Czech, and Ukrainian police unite to dismantle a multi-million dollar vishing ring targeting Czech bank customers. Ten arrests made in a joint effort against cybercrime.

Europol and Local Forces Disband Multi-Million Dollar Vishing Ring

November 19, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact us
  • Press
  • Writers
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Contact Us
    • Press
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.