Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Albabat Ransomware Targets Linux and macOS

March 24, 2025
Reading Time: 2 mins read
in Alerts
UK Teen Boys Unaware of Sextortion Risks

Recent research by Trend Micro reveals that Albabat ransomware has evolved, now targeting not just Windows but also Linux and macOS systems. The ransomware, which initially only affected Windows, has expanded to exploit multiple operating systems, highlighting its increasing sophistication. Trend Micro’s findings also show that the latest versions of the ransomware, 2.0.0 and 2.5, now collect system and hardware information from Linux and macOS devices, in addition to Windows. These versions retrieve configuration data from GitHub, where the ransomware group stores key components of its operations.

The ransomware uses a “User-Agent” string labeled “Awesome App” to interact with GitHub’s REST API and gather configuration data.

This method allows attackers to centralize control over Albabat’s operations and easily update the malware’s tactics. Additionally, the ransomware encrypts a wide range of file extensions, such as .exe, .dll, and .mp3, while avoiding certain folders to evade detection. It also terminates various processes like task managers and productivity software to prevent users from interfering with the encryption process.

The attackers store the stolen data in a PostgreSQL database, which helps them monitor infections, track ransom payments, and potentially sell the sensitive data. The use of GitHub for operational efficiency allows the ransomware group to maintain centralized control over its attacks, making it more adaptable. Trend Micro also noted the ongoing development of Albabat, with a potential version 2.5 currently under development.

This indicates that ransomware attacks will continue to evolve, posing an increasing threat to organizations across different operating systems.

Security experts recommend organizations adopt robust cybersecurity measures to mitigate such risks. These measures include implementing strong access controls, keeping systems updated, and ensuring secure backups. Network segmentation and user training can help prevent initial infections, while proactive AI-powered security platforms can predict and prevent emerging threats like Albabat. The rapid evolution of ransomware, as demonstrated by Albabat, highlights the need for continuous monitoring of indicators of compromise (IoCs) and leveraging threat intelligence to stay ahead of these evolving threats.

Reference:
  • Albabat Ransomware Expands to Target Linux and macOS Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025
Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025

Latest Alerts

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

Subscribe to our newsletter

    Latest Incidents

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    Norwegian Municipalities Hit by Data Breach

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial