Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Albabat Ransomware Targets Linux and macOS

March 24, 2025
Reading Time: 2 mins read
in Alerts
UK Teen Boys Unaware of Sextortion Risks

Recent research by Trend Micro reveals that Albabat ransomware has evolved, now targeting not just Windows but also Linux and macOS systems. The ransomware, which initially only affected Windows, has expanded to exploit multiple operating systems, highlighting its increasing sophistication. Trend Micro’s findings also show that the latest versions of the ransomware, 2.0.0 and 2.5, now collect system and hardware information from Linux and macOS devices, in addition to Windows. These versions retrieve configuration data from GitHub, where the ransomware group stores key components of its operations.

The ransomware uses a “User-Agent” string labeled “Awesome App” to interact with GitHub’s REST API and gather configuration data.

This method allows attackers to centralize control over Albabat’s operations and easily update the malware’s tactics. Additionally, the ransomware encrypts a wide range of file extensions, such as .exe, .dll, and .mp3, while avoiding certain folders to evade detection. It also terminates various processes like task managers and productivity software to prevent users from interfering with the encryption process.

The attackers store the stolen data in a PostgreSQL database, which helps them monitor infections, track ransom payments, and potentially sell the sensitive data. The use of GitHub for operational efficiency allows the ransomware group to maintain centralized control over its attacks, making it more adaptable. Trend Micro also noted the ongoing development of Albabat, with a potential version 2.5 currently under development.

This indicates that ransomware attacks will continue to evolve, posing an increasing threat to organizations across different operating systems.

Security experts recommend organizations adopt robust cybersecurity measures to mitigate such risks. These measures include implementing strong access controls, keeping systems updated, and ensuring secure backups. Network segmentation and user training can help prevent initial infections, while proactive AI-powered security platforms can predict and prevent emerging threats like Albabat. The rapid evolution of ransomware, as demonstrated by Albabat, highlights the need for continuous monitoring of indicators of compromise (IoCs) and leveraging threat intelligence to stay ahead of these evolving threats.

Reference:
  • Albabat Ransomware Expands to Target Linux and macOS Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial