The Evil Corp group has been active since at least 2011 and has extensively used the Dridex banking Trojan and the BitPaymer ransomware. Researchers are reporting that in May 2020, the Evil Corp group began using a new ransomware package named WastedLocker. The group is selective in their targeting and typically target cloud environments, database services, file servers, and virtual machines. These types of targets have the potential of a higher financial return than targeting consumers. The distribution method used by the group has not changed and they continue to use the SocGholish fake update framework which delivers a CobaltStrike loader. A custom crypter named CryptOne is used to protect WastedLocker and it is also used by other malware families. When WastedLocker is executed, if it is not running with administrative rights, it will attempt to elevate its privileges using a UAC bypass technique. It will encrypt files on fixed, remote, removable, and shared drives. Rather than the common list of file types to encrypt, WastedLocker uses an exclusion list of directories and files which are not to be encrypted.
Block all threat indicators at your respective controls.
Search for IOCs in your environment.