Recently, The Sangfor Security Team identified a new GlobeImposter ransomware strain, naming it Globelmposter of Olympian Gods 2.0. Currently, several companies have suffered attacked and experienced a great many losses.

We found several variants with the following extensions appended to encrypted files: Hermes865, Hades865 and Apollon865.

Sangfor identified the first strain of GlobeImposter of Olympian Gods in July 2019, finding that first encrypted files were appended with the extension .ares666. In the subsequent two months, as the first version spread, companies and organizations in the manufacturing, education and business verticals suffered attacks by the following variants: Zeus666, Poseidon666, Apollo666, Artemis666, Ares666, Aphrodite666, Dionysus666, Persephone666, Hephaestus666, Hades666, Demeter666 and Hera666.

Alert New GlobeImposter of Olympian Gods 2_0 is coming 01

Based on the wide-spread first version of GlobeImposter, the attackers developed a second version and changed appended extensions to those of Greek God + 865, like Hermes865, Hades865 and Apollon865. The file type was changed from TXT file to EXE to enable auto-startup.

Alert New GlobeImposter of Olympian Gods 2_0 is coming 02

This alert email is the same as the first version, i.e., Sin_Eater.666@aol.com. What is more, the samples are alike. Without question, attacks by this variant were conducted by the same attackers.

Alert New GlobeImposter of Olympian Gods 2_0 is coming 03

The Sangfor Security Team also discovered that this ransomware is in the debugging phase and encrypted viruses will generate another file named ids.txt, which is used to store an ID and printing error message:

Alert New GlobeImposter of Olympian Gods 2_0 is coming 04

Analysis

After analyzing the captured samples, Sangfor found that it is nearlly identical to the first version in code structure.
After launch, the virus will first create a note file (HOW TO BACK YOUR FILES.exe) and then disable the family group and then Windows defender.

Alert New GlobeImposter of Olympian Gods 2_0 is coming 05

Subsequently, the virus will create an auto-startup item named WindowsUpdateCheck, which will be executed through CMD to delete disk volumes, stop database service, traverse and mount volumes and traverse disk files:

Alert New GlobeImposter of Olympian Gods 2_0 is coming 06

After encrypting files, the virus will duplicate the note file to the encrypted file directory:

Alert New GlobeImposter of Olympian Gods 2_0 is coming 07

Finally, the virus executes command through CMD to delete the RDP connection and system logs and delete itself.

Solutions

Currently there is no decryption tool for victims. You may isolate infected hosts and disconnect them from network.

We recommend performing a virus scan and removal as soon as possible.

Detection and Removal

Sangfor EDR and NGAF products are capable of detecting and removing this ransom virus.

Alert New GlobeImposter of Olympian Gods 2_0 is coming 08

Sangfor offers customers and users free anti-malware software to scan for and remove the virus.

Protection

The Sangfor Security Team recommends proactive protection, as there is no way to decrypt the files encrypted by majority of ransom viruses.

  1. Fix the vulnerability quickly by installing the corresponding patch on the host.
  2. Back up critical data files regularly to other hosts or storage devices.
  3. Do not click on any email attachment from unknown sources and do not download any software from untrusted websites.
  4. Disable unnecessary file sharing.
  5. Strengthen your computer password and do not use the same passwords for multiple computers to avoid compromising a series of computers.
  6. Disable RDP if it is unnecessary for your business. When computers are attacked, use Sangfor NGAF or EDR to block port 3389 and stop the virus from spreading.
  7. Sangfor NGAF and EDR can prevent brute-force attacks. Turn on brute-force attack prevention on NGAF and enable Rules 11080051, 11080027 and 11080016. Turn on brute-force attack prevention on Sangfor EDR.
  8. For Sangfor NGAF customers, update NGAF to version 8.0.5 and enable AI-based Sangfor Engine Zero to achieve the most comprehensive protection.
  9. Deploy Sangfor security products and connect to cloud-based Sangfor Neural-X to detect new threats.
  10. Sangfor SOC, featuring AI, is ready to quickly enhance security capabilities. SOC provides services including checks on device security policies, security threats and relevant vulnerabilities to ensure timely risk detection, remediation and prevention, as well as policy update.
  11. Perform a security scan and virus removal on the entire network to enhance network security. We recommend Sangfor NGAF and EDR to detect, prevent and protect your internal network.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

New TellYouThePass Ransomware Variant Discovered In The Wild

Date : 25 Mar 2024
Read Now

New Mallox Ransomware Variant Discovered In The Wild

Date : 12 Mar 2024
Read Now

Multiple Vulnerabilities in VMware Products (CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, and CVE-2024-22255)

Date : 08 Mar 2024
Read Now

See Other Product

Best Darktrace Cyber Security Competitors and Alternatives in 2024
Sangfor Omni-Command
Cyber Command - NDR Platform
Endpoint Secure
Internet Access Gateway (IAG)
Sangfor Network Secure - Next Generation Firewall