#1 Trending Cyber Security News & Magazine
Friday, May 26, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Cyber attack on the City of Augusta

    Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

    Mirai botnet cyber attack

    Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    Cyber Attack on ETECSA, GlostSec

    GhostSec Hacker Group Claims Cyber Attack on ETECSA, Partial Database Leaked

    Iranian Cybercriminals Targeting UAE Government

    Iranian Cybercriminals Targeting UAE Government Websites Traced with Backdoor Data

    Volt Typhoon

    Chinese Espionage Operation ‘Volt Typhoon’ Targets US Critical Infrastructure

    UAE banking sector

    Cyber Attack on UAE Banking Sector: Mysterious Team Bangladesh Claims to Hit First Abu Dhabi Bank

    Obsidian ORB Ransomware

    New Obsidian ORB Ransomware Emerges with Unique Extortion Technique

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    Stack Identity

    Silicon Valley Startup, Stack Identity Receives $4 Million to Detect Shadow Access in Cloud

    Cyble Wins at the Global InfoSec Awards 2023

    Cyble Triumphs Yet Again With 9 Category Wins at the Global InfoSec Awards 2023, Including Editor’s Choice for Cybersecurity Startup

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Cyber attack on the City of Augusta

    Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

    Mirai botnet cyber attack

    Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    Cyber Attack on ETECSA, GlostSec

    GhostSec Hacker Group Claims Cyber Attack on ETECSA, Partial Database Leaked

    Iranian Cybercriminals Targeting UAE Government

    Iranian Cybercriminals Targeting UAE Government Websites Traced with Backdoor Data

    Volt Typhoon

    Chinese Espionage Operation ‘Volt Typhoon’ Targets US Critical Infrastructure

    UAE banking sector

    Cyber Attack on UAE Banking Sector: Mysterious Team Bangladesh Claims to Hit First Abu Dhabi Bank

    Obsidian ORB Ransomware

    New Obsidian ORB Ransomware Emerges with Unique Extortion Technique

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    Stack Identity

    Silicon Valley Startup, Stack Identity Receives $4 Million to Detect Shadow Access in Cloud

    Cyble Wins at the Global InfoSec Awards 2023

    Cyble Triumphs Yet Again With 9 Category Wins at the Global InfoSec Awards 2023, Including Editor’s Choice for Cybersecurity Startup

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber Essentials

All You Need to Know About The Nokoyawa Ransomware Group

Nokoyawa ransomware is not as prolific as its peers BlackCat or LockBit. For that reason, the sudden listing of about two dozen victims has put up red flags

Chandu Gopalakrishnan by Chandu Gopalakrishnan
May 26, 2023
in Cyber Essentials, Cybersecurity News, Firewall Daily, Ransomware News
0
Nokoyawa Ransomware Group
589
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter

Nokoyawa Leaks, the official communication channel for the Nokoyawa ransomware group, re-emerged on the darkweb this week, revealing a list of 24 new victims.

With their latest variant, Nokoyawa 2.0, the group showcases enhanced file encryption capabilities and employs the highly performant Rust programming language.

You might also like

Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

Nokoyawa ransomware is not as prolific as its peers ALPHV or LockBit. For that reason, the sudden listing of about two dozen victims has put up red flags. Moreover, the act that it’s a derivative of the Hive ransomware worsens the possible risks.

Operating primarily on 64-bit Windows systems, Nokoyawa ransomware group has gained notoriety for its double extortion tactics, combining data exfiltration with traditional file encryption and ransom demands.

Nokoyawa ransomware group popped up in cybersecurity news recently when researchers at Kaspersky disclosed that perpetrators exploited a zero-day vulnerability in the Windows Common Log File System (CLFS) to deploy the ransomware.

The severity of the situation prompted the Cybersecurity and Infrastructure Security Agency (CISA) to include Windows zero-day CVE-2023-28252 in its list of Known Exploited Vulnerabilities.

Here is what you need to know about the Nokoyawa ransomware group, its origins and mode of operation.

Nokoyawa Ransomware recent attack

Nokoyawa ransomware group: Origins

The Nokoyawa ransomware group first surfaced in February 2022, built upon the foundation of a 64-bit Windows-based system. Researchers were quick to discover the pugmarks of Hive ransomware all over the new entrant.

In the latter half of 2021, Hive ransomware gained significant attention for its widespread attacks on over 300 organizations within a mere four-month period. This malicious group managed to amass substantial profits, potentially amounting to millions of US dollars.

In March 2022, Trend Micro researchers uncovered a connection between Hive and the lesser-known Nokoyawa ransomware group.

The Similarities

The similarities between the two ransomware families, ranging from the tools utilized to the sequential execution of attack steps, suggest a possible link.

Both groups employ Cobalt Strike during the initial stage of the attack to gain a foothold, noted Trend Micro researchers.

Additionally, they rely on commonly exploited legitimate tools like GMER and PC Hunter, primarily used for anti-rootkit scanning, to evade defensive measures.

“Other steps, such as information gathering and lateral deployment, are also similar,” said the Trend Micro researchers.

Nokoyawa ransomware group: Features

Initially written in the C programming language and utilizing Elliptic Curve Cryptography (ECC) with SECT233R1, the malware targeted organizations through asymmetric encryption and a Salsa20 symmetric key for file encryption.

“In September 2022, Nokoyawa was rewritten in the Rust programming language using ECC with the Curve25519 and Salsa20 for file encryption,” said a Zscaler threat assessment report on the ransomware.

The updated version, Nokoyawa 2.0, introduced runtime flexibility through a command-line configuration parameter, further enhancing the ransomware’s capabilities.

One distinctive feature of Nokoyawa 2.0 is its unique design choice of requiring a full configuration file via the command-line, noted Zscaler researchers.

This approach suggests that the malware authors have tailored the ransomware to cater to multiple threat actors. These affiliates are likely paid to compromise organizations and deploy the ransomware, receiving a percentage of the profits in return.

Encryption algorithms by Nokoyawa

The encryption algorithms employed by Nokoyawa 2.0 combine Curve25519, a popular choice for asymmetric encryption based on the x25519_dalek Rust library, and Salsa20 for symmetric encryption.

Upon execution, Nokoyawa generates an ephemeral Curve25519 key pair. Using a Diffie-Hellman key exchange with the Curve25519 public key passed via the configuration parameter, the ransomware derives a shared secret that serves as the Salsa20 key.

Additionally, the file extension acts as the nonce, which must be eight bytes long. Notably, Nokoyawa efficiently encrypts files by dividing them into blocks and encrypting them in chunks, making the encryption process swift and effective.

The extortion methods of Nokoyawa ransomware group

To communicate its demands, the Nokoyawa ransomware group employs a ransom note, the filename and content of which are passed through the configuration command-line parameter.

“The decision by the Nokoyawa malware author to pass a full configuration file via the command-line is a unique design choice,” said the Zscaler report.

“This is indicative that the malware author has developed the ransomware to be flexible for multiple threat actors who are likely paid as affiliates to compromise organizations and deploy the ransomware in return for a percentage of the profit.”

Nokoyawa ransomware group
Nokoyawa ransom note: Zscaler

The sample ransom note of Nokoyawa ransomware group reveals their intent and provides instructions to the victim on how to proceed. Furthermore, the ransom notes include a link to a TOR hidden service, serving as a chat portal where negotiations can take place.

Interestingly, the same TOR hidden service hosts a data leak site. As of now, only one victim is listed on the site, indicating that the Nokoyawa ransomware group may not have compromised a large number of organizations or that the threat actors selectively engage in double extortion attacks, added the Zscaler report.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: cybersecurity newsHive ransomwarehive ransomware groupnokoyawa leaksnokoyawa ransomware groupransomware newsThe Cyber Express
Previous Post

GhostSec Hacker Group Claims Cyber Attack on ETECSA, Partial Database Leaked

Next Post

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

Chandu Gopalakrishnan

Chandu Gopalakrishnan

Executive Editor, The Cyber Express

Related Posts

Cyber attack on the City of Augusta
Firewall Daily

Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

by Chandu Gopalakrishnan
May 26, 2023
Mirai botnet cyber attack
Firewall Daily

Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

by Vishwa Pandagle
May 26, 2023
Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note
Data Breach News

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

by Vishwa Pandagle
May 26, 2023
Cyber Attack on ETECSA, GlostSec
Firewall Daily

GhostSec Hacker Group Claims Cyber Attack on ETECSA, Partial Database Leaked

by Ashish Khaitan
May 25, 2023
Iranian Cybercriminals Targeting UAE Government
Firewall Daily

Iranian Cybercriminals Targeting UAE Government Websites Traced with Backdoor Data

by Vishwa Pandagle
May 25, 2023
Next Post
Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Issue is Out. Subscribe Now

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

mailchimp

Latest Cyber News

Cyber attack on the City of Augusta
Firewall Daily

Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

May 26, 2023
Mirai botnet cyber attack
Firewall Daily

Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

May 26, 2023
Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note
Data Breach News

Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

May 26, 2023
Nokoyawa Ransomware Group
Cyber Essentials

All You Need to Know About The Nokoyawa Ransomware Group

May 26, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cyber Security News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance