Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Albabat Ransomware Targets Linux and macOS

March 24, 2025
Reading Time: 2 mins read
in Alerts
UK Teen Boys Unaware of Sextortion Risks

Recent research by Trend Micro reveals that Albabat ransomware has evolved, now targeting not just Windows but also Linux and macOS systems. The ransomware, which initially only affected Windows, has expanded to exploit multiple operating systems, highlighting its increasing sophistication. Trend Micro’s findings also show that the latest versions of the ransomware, 2.0.0 and 2.5, now collect system and hardware information from Linux and macOS devices, in addition to Windows. These versions retrieve configuration data from GitHub, where the ransomware group stores key components of its operations.

The ransomware uses a “User-Agent” string labeled “Awesome App” to interact with GitHub’s REST API and gather configuration data.

This method allows attackers to centralize control over Albabat’s operations and easily update the malware’s tactics. Additionally, the ransomware encrypts a wide range of file extensions, such as .exe, .dll, and .mp3, while avoiding certain folders to evade detection. It also terminates various processes like task managers and productivity software to prevent users from interfering with the encryption process.

The attackers store the stolen data in a PostgreSQL database, which helps them monitor infections, track ransom payments, and potentially sell the sensitive data. The use of GitHub for operational efficiency allows the ransomware group to maintain centralized control over its attacks, making it more adaptable. Trend Micro also noted the ongoing development of Albabat, with a potential version 2.5 currently under development.

This indicates that ransomware attacks will continue to evolve, posing an increasing threat to organizations across different operating systems.

Security experts recommend organizations adopt robust cybersecurity measures to mitigate such risks. These measures include implementing strong access controls, keeping systems updated, and ensuring secure backups. Network segmentation and user training can help prevent initial infections, while proactive AI-powered security platforms can predict and prevent emerging threats like Albabat. The rapid evolution of ransomware, as demonstrated by Albabat, highlights the need for continuous monitoring of indicators of compromise (IoCs) and leveraging threat intelligence to stay ahead of these evolving threats.

Reference:
  • Albabat Ransomware Expands to Target Linux and macOS Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

BEARDSHELL and COVENANT Malware Uncovered

BEARDSHELL and COVENANT Malware Uncovered

June 24, 2025
New Malware Skims WordPress E-commerce Sites

New Malware Skims WordPress E-commerce Sites

June 24, 2025
Chinese Hackers Build Router Spy Network

Chinese Hackers Build Router Spy Network

June 24, 2025
Stealth Malware Targets Fortinet Firewalls

Spyware in App Stores Steals Your Photos

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Stealth Malware Targets Fortinet Firewalls

June 23, 2025

Latest Alerts

Chinese Hackers Build Router Spy Network

New Malware Skims WordPress E-commerce Sites

BEARDSHELL and COVENANT Malware Uncovered

Prometei Botnet Attacks Servers for Crypto

Spyware in App Stores Steals Your Photos

Stealth Malware Targets Fortinet Firewalls

Subscribe to our newsletter

    Latest Incidents

    Hacken Token Crashes 99 Percent After Hack

    Paraguayan Government Hit By Cyberattack

    Hackers Leak Saudi Games Athlete Data

    Aflac Hacked in Spree on Insurance Firms

    CoinMarketCap Doodle Hack Steals Crypto

    UK’s Oxford Council Legacy Systems Breached

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial