Introduction: This analysis focuses on Cheerscrypt ransomware, a multiplatform threat that surfaced in May 2022. With a Linux version initially launched, followed by a Windows variant in June 2022, Cheerscrypt is characterized by targeting corporate networks and engaging in multi-extortion tactics, demanding payment for decryption tools and the non-release of stolen data. The ransomware incorporates code from the leaked Babuk builders and shares functionality with the Babuk family.
Target and Modus Operandi: Cheerscrypt primarily targets the healthcare, financial services, entertainment, and education industries, with limited SMB (small to medium-sized businesses) targeting observed. The ransomware is delivered via Cobalt Strike or similar frameworks, and threat actors have exploited the Log4Shell vulnerability for initial access.
Technical Insights: The Linux variant, emerging in May 2022, specifically targeted VMware ESXi servers. Cheerscrypt only requires a supplied encryption path to initiate the encryption process. It attempts to rename files before encryption and terminate VMware-related processes. Analysis of samples reveals the use of ECDH (Elliptic-curve Diffie-Hellman) and an embedded public key for encryption. Encrypted files bear the “.Cheers” extension, and a ransom note named “How to Restore Your Files.txt” is left in directories containing encrypted files. Cheerscrypt actors employ tools such as Impacket, Keylogger, NPS, and IOX for reconnaissance, lateral movement, and data collection/exfiltration.
Detection Strategies: EDR is equipped to identify and prevent malicious activities and artifacts associated with Cheerscrypt ransomware. For organizations without this specific security solution, a comprehensive approach is recommended:
Mitigation Measures: , the following steps can help mitigate the risk of Cheerscrypt ransomware attacks:
A proactive cybersecurity approach, encompassing employee education, preventive measures, and recovery strategies, is essential to effectively mitigate ransomware threats like Cheerscrypt.
Back