Tuesday, February 7, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • MagazineLatest Issue
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    RansomHouse

    RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

    OpenSSH Server

    OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    Dell Vulnerability

    Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

    Mirai to Medusa Botnet

    Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

    Sharp Data Breach

    Sharp Healthcare Data Breach Puts 62,777 Patients Information At Risk

    Microsoft Exchange Server

    Have You Patched This Microsoft Vulnerability Yet?

    Oh No! Demon Slayer Season 3

    Oh No! Demon Slayer Season 3, Episode 1 Leaked

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Call and Contact Center Expo

    The Countdown Begins: The Call and Contact Center Expo Las Vegas 2023 is Officially Here!

    Kemba Walden

    Kemba Walden: The Next ONCD Top Boss?

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    World CyberCon

    The Cyber Express to Host the World CyberCon India Edition on November 18, 2022

    World CyberCon India Edition 2022

    World CyberCon India Edition 2022

    GITEX GLOBAL 2022

    GITEX GLOBAL 2022 Helps Break The Glass Ceiling For Women Entrepreneurs

    Cybersecurity in 2023, Value Point Systems

    Softline Acquires Indian Cybersecurity Firm Value Point Systems

    KnowBe4 Vista Equity Partners

    KnowBe4 Goes Private With a $4.6 Billion Deal With Vista Equity Partners

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineLatest Issue
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    RansomHouse

    RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

    OpenSSH Server

    OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    Dell Vulnerability

    Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

    Mirai to Medusa Botnet

    Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

    Sharp Data Breach

    Sharp Healthcare Data Breach Puts 62,777 Patients Information At Risk

    Microsoft Exchange Server

    Have You Patched This Microsoft Vulnerability Yet?

    Oh No! Demon Slayer Season 3

    Oh No! Demon Slayer Season 3, Episode 1 Leaked

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Call and Contact Center Expo

    The Countdown Begins: The Call and Contact Center Expo Las Vegas 2023 is Officially Here!

    Kemba Walden

    Kemba Walden: The Next ONCD Top Boss?

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    World CyberCon

    The Cyber Express to Host the World CyberCon India Edition on November 18, 2022

    World CyberCon India Edition 2022

    World CyberCon India Edition 2022

    GITEX GLOBAL 2022

    GITEX GLOBAL 2022 Helps Break The Glass Ceiling For Women Entrepreneurs

    Cybersecurity in 2023, Value Point Systems

    Softline Acquires Indian Cybersecurity Firm Value Point Systems

    KnowBe4 Vista Equity Partners

    KnowBe4 Goes Private With a $4.6 Billion Deal With Vista Equity Partners

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Everything About The Moisha Ransomware

Editorial by Editorial
August 26, 2022 - Updated on January 25, 2023
in Firewall Daily
0
Moisha ransomware
586
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

Moisha is a .NET ransomware that was initially spotted in mid-August. Cyble Research Labs’ findings showed that the ransom note contained the name of an organization, indicating that the malware may have been developed as part of a highly targeted attack.

How does Moisha Ransomware work?

Moisha uses double-extortion techniques to force victims into paying the ransom. This technique enables it to exfiltrate and encrypt victim data.

You might also like

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

International Safer Internet Day: How Safe Are Our Teenagers Online?

Moisha

Upon execution, the ransomware news initially creates a global mutex to ensure that only one instance of the malware is present on the victim’s system at any given time. The malware terminates its execution if it detects another mutex already on the machine.

Next, the malware searches for other services that are often found in the system – such as backup services, malware-scanner services, etc. If any malware is detected in the system, the program will stop any services that would block access to the files. This step ensures that these services do not interfere with later encryptions.

Moisha Ransomware

After stopping the active processes, the ransomware checks for a list of processes and kills them if they run on the victim’s machine. The Moisha ransomware also disables the Microsoft Defender Antivirus’ real-time protection and deletes shadow copies using PowerShell and Vssadmin.

Next, the malware gets the available system and later enumerates the files and folders inside the identified system drive and starts a new thread for the file encryption process,

Before the encryption process begins, the ransomware drops a ransom note in the same folder with the file name, “!!!READ TO RECOVER YOUR DATA!!!.txt.” The malware generates the message by decoding hard-coded Base64 content.

Moisha Ransomware

Moisha Ransomware Encryption:

Moisha ransomware is a type of file-encrypting malware which uses the RSA and AES encryption algorithms. It also comes with a fixed hardcoded Base64 encoded RSA public key. The malware also checks whether the file size is less than 2 GB using the “OnItemArrived()” function. Based on the file size, it calls the encryptor function to perform file encryption faster.

Moisha Ransomware

The ransomware excludes some directory names, file names, and extensions during its encryption process. Once the victim’s system is infected, the malware spreads to other machines in that network. Finally, the ransomware deletes itself by using the PowerShell command line:

Moisha Ransomware Ransom Note:

In the ransom note, Moisha demands that victims contact the TAs to restore their encrypted files. The ransomware has compromised about 200 gigabytes of work-related files and source codes. The ransom note includes a bitcoin address, a Protonmail account, and a Moisha ID.

Moisha Ransomware

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: cyber express newsmalwareMoisha RansomwarePowerShellRansomwareThe Cyber Express
Previous Post

Lockbit vs Entrust: Ransomware Gang Blames Security Company for DDoS Attack

Next Post

LastPass Breached: Over 25 Million Users May Have Been Affected

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

RansomHouse
Data Breach News

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

by Vishwa Pandagle
February 7, 2023
OpenSSH Server
Firewall Daily

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

by Editorial
February 7, 2023
Safer Internet
Firewall Daily

International Safer Internet Day: How Safe Are Our Teenagers Online?

by Vishwa Pandagle
February 7, 2023
Dell Vulnerability
Firewall Daily

Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

by Ashish Khaitan
February 7, 2023
Mirai to Medusa Botnet
DDoS Attacks

Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

by Vishwa Pandagle
February 7, 2023
Next Post
LastPass hacked

LastPass Breached: Over 25 Million Users May Have Been Affected

Latest Issue is Out. Subscribe Now

Ai in Cybersecurity - Cybersecurity Magazine by The Cyber Express

Download Now



Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Recommended

Bargain

What Happens When You Bargain Wrong With Ransomware Gang?

December 30, 2022
Salary calculating Excel File

Fake Salary Calculating Excel File Target Ukrainian and Russian Military Personnel

October 13, 2022

Categories

Don't miss it

World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum
Cybersecurity News

World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

February 7, 2023
RansomHouse
Data Breach News

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

February 7, 2023
OpenSSH Server
Firewall Daily

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

February 7, 2023
Safer Internet
Firewall Daily

International Safer Internet Day: How Safe Are Our Teenagers Online?

February 7, 2023
Dell Vulnerability
Firewall Daily

Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

February 7, 2023
Mirai to Medusa Botnet
DDoS Attacks

Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

February 7, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.