Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Paragon is not collaborating with Italian authorities probing spyware attacks, report says

April 28, 2026

Microsoft cuts OpenAI revenue share as their AI alliance loosens

April 28, 2026
Facebook X (Twitter) Instagram
Trending
  • Investors trust Google more than Meta when comes to spending on AI
  • Paragon is not collaborating with Italian authorities probing spyware attacks, report says
  • Microsoft cuts OpenAI revenue share as their AI alliance loosens
  • Robotically assembled building blocks could make construction more efficient and sustainable | MIT News
  • AI showdown: Musk and Altman go to trial in fight over OpenAI’s beginnings
  • U.S., Iran seize ships as war evolves into standoff over Strait of Hormuz
  • Google launches training and inference TPUs in latest shot at Nvidia
  • Zoom teams up with World to verify humans in meetings
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Thursday, May 7
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » New Ebyte Ransomware Attacking Windows Users With Advanced Encryption Tactics

New Ebyte Ransomware Attacking Windows Users With Advanced Encryption Tactics

GTBy GTMarch 16, 2025 Cybersecurity No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


New Ebyte Ransomware Attacking Windows Users With Advanced Encryption Tactics

A sophisticated new ransomware strain dubbed “Ebyte” targeting Windows systems across North America and Europe.

The ransomware has compromised thousands of systems since its detection three weeks ago, utilizing advanced encryption tactics that have challenged security experts.

Initial infection vectors primarily involve phishing emails containing malicious Office documents that exploit a recent Windows vulnerability (CVE-2025-0142).

These phishing attempts mimic legitimate business communications with unusually high success rates.

The messages typically appear as invoice reminders or shipping notifications from trusted business partners, containing documents that trigger the exploit when opened.

Once executed, the malware establishes persistence through registry modifications and scheduled tasks before disabling security tools and backup solutions.

The ransomware performs a thorough system scan before encryption, prioritizing business-critical files like databases and financial records.

This targeted approach suggests the attackers have specific knowledge of business operations to maximize potential ransom payments.

The malware has an unusual capability to identify and target network shares even when they’re not actively mapped to the infected system.

Initial forensic analysis by researchers at Cyfirma indicates that Ebyte may be linked to the threat actor group known as BlackShadow, previously responsible for attacks on healthcare and manufacturing sectors.

Web-based control panel (Source – Cyfirma)

The sophistication of the code and infrastructure suggests state-sponsored involvement, though attribution remains preliminary at this stage of investigation.

Analysis of Encryption Methodology

Ebyte implements a sophisticated hybrid encryption system combining ChaCha20 for file encryption with a unique 256-bit key for each victim.

This key is then encrypted using a 4096-bit RSA algorithm, making decryption without the ransom key virtually impossible.

The malware also incorporates anti-analysis features that detect debugging environments and virtual machines, terminating execution if such environments are detected.

The core encryption function reveals advanced obfuscation techniques designed to evade static analysis tools. When examining the decompiled code, researchers identified the primary encryption routine:

def encrypt_file(file_path, encryption_key):
nonce = os.urandom(12)
cipher = ChaCha20.new(key=encryption_key, nonce=nonce)

with open(file_path, ‘rb’) as file:
plaintext = file. Read()

ciphertext = cipher. Encrypt(plaintext)

with open(file_path + ‘.ebyte’, ‘wb’) as encrypted_file:
encrypted_file.write(nonce + ciphertext)

secure_delete(file_path)

Encryption Key Generation Process (Source – Cyfirma)

What makes Ebyte particularly concerning is its implementation of a secure key management system that generates unique encryption keys for each file.

These keys are then encrypted and stored in a custom file structure, preventing the development of universal decryption tools even if researchers manage to recover individual keys from memory.

The ransomware also attempts to delete shadow copies and disable Windows recovery features.

Ransom demands range from $50,000 to $2 million in Monero cryptocurrency, with victims directed to a Tor-based payment portal.

Ransom Note (Source – Cyfirma)

The ransom note also threatens to publish exfiltrated data if payment isn’t received within 72 hours, indicating the attackers employ a double-extortion strategy.

Security experts recommend keeping systems patched, implementing email filtering, maintaining offline backups, and deploying advanced endpoint protection to mitigate this emerging threat.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.



Source link

GT
  • Website

Keep Reading

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

Top 10 Best Server Monitoring Tools

10 Best Cybersecurity Risk Management Tools

Best DDoS Protection Tools & Services in 2026 (Reviewed)

20 Best Malware Protection Solutions In 2026

10 Most Notable Cyber Attacks of 2026

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Google launches training and inference TPUs in latest shot at Nvidia

April 27, 2026

Meta tracks employee usage on Google, LinkedIn AI training project

April 25, 2026

Meta will cut 10% of workforce as company pushes deeper into AI

April 24, 2026
Latest Posts

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

April 1, 2026

Top 10 Best Server Monitoring Tools

April 1, 2026

10 Best Cybersecurity Risk Management Tools

March 31, 2026

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2026 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.