Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Babuk (Ransomware) – Malware

March 2, 2025
Reading Time: 2 mins read
in Malware
Babuk (Ransomware) – Malware

Babuk

Type of Malware

Ransomware

Addittional Names

Babyk
Vasa Locker

Associated Groups

Evil Corp

Date of Initial Activity

2020

Motivation

Financial Gain

Attack Vectors

Phishing
Remode Desktop Protocol(RDP)

Targeted Systems

Windows
Linux

Overview

Babuk ransomware, a sophisticated strain of malware first discovered in 2020, quickly gained notoriety for its advanced encryption techniques and rapid spread. It primarily targets high-value sectors like healthcare, finance, and critical infrastructure. Babuk operates under a Ransomware-as-a-Service (RaaS) model, allowing cybercriminal affiliates to deploy the malware for financial gain. Notable for its ability to exfiltrate sensitive data, it uses AES-256 encryption and is often distributed through phishing emails, RDP exploits, and vulnerabilities. Babuk has proven to be highly effective, making it a significant threat to organizations worldwide.

Targets

Information Educational Services Public Administration Health Care and Social Assistance

How they operate

Babuk ransomware operates with a high degree of sophistication, leveraging a combination of advanced encryption and rapid deployment techniques. After initial access—typically gained through phishing, exploited vulnerabilities, or RDP brute force—Babuk establishes a persistent foothold in the victim’s environment. It then uses the Cobalt Strike framework to escalate privileges and move laterally across the network. The ransomware employs AES-256 encryption to lock files, targeting critical data such as documents, images, and backup files. Additionally, Babuk is capable of deleting system restore points and shadow copies, making recovery more difficult without paying the ransom. Beyond encryption, it also exfiltrates sensitive data like user credentials and financial information, which it may threaten to release unless the victim complies with ransom demands. Babuk’s modular structure allows it to execute different functions such as scanning for specific file types and controlling encryption speed. The ransomware’s speed is a notable feature; it encrypts data quickly, minimizing the time it takes to impact an organization. Once the encryption process is complete, a ransom note is displayed with instructions on how to pay and prevent the leak of stolen data. In addition to these technical aspects, Babuk’s operators use their RaaS (Ransomware-as-a-Service) model, offering the ransomware to affiliates. This allows for more widespread deployment and faster propagation across various sectors, contributing to its rapid rise in prominence.  
References
  • Babuk
  • Babuk
Tags: BabukBabykEvil CorpFinanceHealth CareHealthcareLinuxMalwarePhishingRaaSRansomwareVasa LockerWindows
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Mozilla Urgent Firefox Patch Fixes RCE Flaws

ModiLoader Malware Targets Windows Users

Glibc Flaw Gives Linux Root Access Risk

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Subscribe to our newsletter

    Latest Incidents

    Massive DDoS Hits Poland’s Civic Platform

    Arla Plant Cyberattack Halts Operations

    Georgia’s Harbin Clinic Hit by Data Breach

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial