Tycoon, a multi-platform Java-based ransomware which targets Windows and Linux has been seen in the wild since December of 2019. Tycoon ransomware attempts to infiltrate small to medium sized companies and institutions in education and software industries. As with other ransomware software and threat actors, encrypting data in order to extort payment for the return of the stolen data to a victim is the primary mission. Initial infection of Tycoon involves the attack of Internet-facing RDP jump-servers. Persistence is gained through a technique called Image File Execution Options (IFEO) injection which are stored in the Windows registry. Usage of a backdoor as well as the Microsoft Windows On-Screen Keyboard allowed for quick access to infected systems. Attackers also disable any anti-malware solutions using the ProcessHacker utility as well as changing the passwords of Active Directory servers thus blocking the victim from accessing to their own servers.
The last step in the infection process involves the execution of the Java ransomware module which encrypts all file servers including backup systems connected to the networks. Finally, analysts have suggested, that due to the overlap of email addresses and naming conventions of encrypted files, there could be a connection between Tycoon and Dharma/CrySIS ransomware.