A concerning development in the realm of ransomware has surfaced with the emergence of a new strain dubbed ‘Xaro,’ a variant of the DJVU ransomware. This latest iteration is being propagated through cracked software, posing as freeware installers, and has been identified appending the .xaro extension to compromised files while demanding ransom for decryption. Security researcher Ralph Villanueva from Cybereason highlighted the worrying trend of Xaro’s distribution, emphasizing its infiltration alongside various commodity loaders and information stealers, intensifying its potential impact on infected systems.
The modus operandi of Xaro involves deploying a sophisticated attack chain, where the ransomware is camouflaged within an archive file from deceptive sources, disguising itself as a legitimate freeware provider. Once users open this deceptive archive, it triggers the execution of a seemingly innocent installer binary for a PDF writing software, known as CutePDF. However, in reality, this executable functions as a pay-per-install malware downloader service called PrivateLoader. This approach allows Xaro to establish connections with command-and-control servers, enabling the delivery of a multitude of malware families, including information stealers like RedLine Stealer and Vidar, alongside the ransomware payload. The strategic deployment of Xaro mirrors a shotgun-like approach, facilitating the download and execution of multiple malware strains, emphasizing the tactic’s commonality in PrivateLoader infections originating from dubious freeware or cracked software sources.
Xaro’s capabilities extend beyond file encryption, as it also unleashes a ransom note, demanding $980 for a decryptor and private key, a sum reduced to $490 if paid within 72 hours. This intricate yet malicious scheme serves as a cautionary tale, highlighting the inherent risks associated with downloading software from untrusted platforms and the critical need for robust cybersecurity measures to safeguard against these pervasive threats.
Read more