Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Albabat Ransomware Targets Linux and macOS

March 24, 2025
Reading Time: 2 mins read
in Alerts
UK Teen Boys Unaware of Sextortion Risks

Recent research by Trend Micro reveals that Albabat ransomware has evolved, now targeting not just Windows but also Linux and macOS systems. The ransomware, which initially only affected Windows, has expanded to exploit multiple operating systems, highlighting its increasing sophistication. Trend Micro’s findings also show that the latest versions of the ransomware, 2.0.0 and 2.5, now collect system and hardware information from Linux and macOS devices, in addition to Windows. These versions retrieve configuration data from GitHub, where the ransomware group stores key components of its operations.

The ransomware uses a “User-Agent” string labeled “Awesome App” to interact with GitHub’s REST API and gather configuration data.

This method allows attackers to centralize control over Albabat’s operations and easily update the malware’s tactics. Additionally, the ransomware encrypts a wide range of file extensions, such as .exe, .dll, and .mp3, while avoiding certain folders to evade detection. It also terminates various processes like task managers and productivity software to prevent users from interfering with the encryption process.

The attackers store the stolen data in a PostgreSQL database, which helps them monitor infections, track ransom payments, and potentially sell the sensitive data. The use of GitHub for operational efficiency allows the ransomware group to maintain centralized control over its attacks, making it more adaptable. Trend Micro also noted the ongoing development of Albabat, with a potential version 2.5 currently under development.

This indicates that ransomware attacks will continue to evolve, posing an increasing threat to organizations across different operating systems.

Security experts recommend organizations adopt robust cybersecurity measures to mitigate such risks. These measures include implementing strong access controls, keeping systems updated, and ensuring secure backups. Network segmentation and user training can help prevent initial infections, while proactive AI-powered security platforms can predict and prevent emerging threats like Albabat. The rapid evolution of ransomware, as demonstrated by Albabat, highlights the need for continuous monitoring of indicators of compromise (IoCs) and leveraging threat intelligence to stay ahead of these evolving threats.

Reference:
  • Albabat Ransomware Expands to Target Linux and macOS Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial