A sophisticated cyber threat known as RedEnergy has been discovered targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines through LinkedIn pages.
This stealer-as-a-ransomware malware is capable of stealing information from browsers, exfiltrating sensitive data, and carrying out ransomware activities. The attackers aim to inflict maximum damage by combining data theft with encryption. The attack begins with a FakeUpdates campaign, tricking users into downloading malware disguised as browser updates.
What sets RedEnergy apart is its utilization of reputable LinkedIn pages to redirect victims to a fake landing page, prompting them to update their web browsers. This action leads to the download of a malicious executable, enabling the attackers to perform browser updates, harvest sensitive information, and encrypt stolen files. Zscaler researchers discovered suspicious FTP interactions, suggesting the exfiltration of valuable data to actor-controlled infrastructure.
In the final stage, RedEnergy’s ransomware encrypts the user’s data, appending the “.FACKOFF!” extension to each file and deleting existing backups, leaving victims at risk of data loss.
The emergence of RedEnergy represents an evolution in cybercrime, where stealer and ransomware functionalities are combined. This follows the trend of RAT-as-a-ransomware threats, where remote access trojans like Venom RAT and Anarchy Panel RAT have been equipped with ransomware modules.
To protect against such malicious campaigns, individuals and organizations are advised to exercise caution when accessing websites, particularly those linked from LinkedIn profiles. Vigilance in verifying the authenticity of browser updates and being cautious of unexpected file downloads are crucial preventive measures.