Ankura CTIX FLASH Update - June 14, 2024

Ankura Consulting Group LLC


Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit,
Researchers at Elastic Security Labs have reported on an ongoing malware campaign pushing the "WARMCOOKIE" Windows backdoor via fake employment opportunities.
United States Technology
To print this article, all you need is to be registered or login on

Ransomware/Malware Activity

WARMCOOKIE Backdoor Distributed via Fake Job Offers

Researchers at Elastic Security Labs have reported on an ongoing malware campaign pushing the "WARMCOOKIE" Windows backdoor via fake employment opportunities. The victims of the campaign are initially sent an email purportedly from a company interested in hiring the individual. The email encourages the victim to click on a link to take them to the company's internal recruitment platform to learn more. The link directs victims to a landing page which prompts the victim to solve a CAPTCHA prior to downloading a JavaScript file containing malicious code. The JavaScript file leverages Window's Background Intelligence Transfer Service (BITS) to download the WARMCOOKIE DLL file which is executed via rundll32.exe. WARMCOOKIE collects background information on the infected host which is encrypted and sent to the attacker C2. The backdoor's main capabilities include capturing screenshots, enumerating the registry key, executing arbitrary commands, dropping files, and reading file contents. It is important to note that the backdoor can be a gateway to other malicious forms of malware. This is not the first time WARMCOOKIE has been observed, as it was previously discovered by researchers at eSentire around June 2023. CTIX analysts will continue to report on new and emerging forms of malware and associated campaigns.

Threat Actor Activity

Crypter Specialist Linked to Conti and LockBit Ransomware Arrested

Ukrainian cyber police have made a significant arrest in Kyiv, detaining a 28-year-old Russian man linked to the notorious Conti and LockBit ransomware operations. The Ukrainian programmer faces up to fifteen (15) years in prison if convicted. This arrest, part of 'Operation Endgame,' was facilitated by information from Dutch police following a ransomware attack on a multinational in the Netherlands. The suspect specialized in creating custom crypters, tools designed to disguise ransomware payloads as harmless files, thereby evading detection by popular antivirus products. His services were sold to both Conti and LockBit groups, enhancing their ability to breach networks successfully. LockBit and Conti have been among the most prolific ransomware groups, with LockBit's malware disrupting thousands of businesses globally including Boeing and the UK's Royal Mail, and Conti being notorious for targeting US healthcare organizations. This arrest comes at a time when global law enforcement agencies are intensifying efforts to combat cybercrime. Just last month, the U.S. Justice Department announced the arrest of Rui-Siang Lin, a Taiwanese national connected to the illegal dark web narcotics marketplace, Incognito Market. Earlier in February, efforts were made to shut down the LockBit extorsion site, but it resurfaced again in May. While unsuccessful in shutting the extortion site down, the FBI did gain possession of up to 7,000 decryption keys that can be used to help LockBit victims reclaim their data. This series of arrests and takedowns, including the recent Operation Endgame, signals a significant blow to cybercriminal networks and emphasizes the international cooperation among law enforcement agencies to tackle the evolving threat of cybercrime.


Black Basta Actively Exploiting Critical Windows Privilege Escalation Vulnerability to Deliver Ransomware

The Black Basta ransomware group, linked to the Cardinal cybercrime group (also known as Storm-1811 and UNC4393), is suspected of exploiting a high-severity privilege escalation vulnerability in the Windows Error Reporting Service as a zero-day. This flaw, tracked as CVE-2024-26169 (CVSS score of 7.8/1-), allows attackers to gain SYSTEM-level privileges and was patched by Microsoft in March 2024. Symantec's analysis suggests the exploit tool was active before the patch, possibly as early as December 2023, indicating zero-day exploitation. Black Basta, known for leveraging initial access through malware like QakBot and DarkGate, has recently used legitimate Microsoft products such as Quick Assist and Teams to impersonate IT personnel and execute attacks. The exploit tool manipulates registry keys to launch a shell with administrative privileges. Despite potential timestamp falsification, the motive appears minimal. Black Basta, with ties to the defunct Conti syndicate, has caused over 500 breaches since April 2022 and extorted over $100 million. The resurgence of ransomware, marked by new variants like DORRA and increased ransom payments, underscores the evolving threat landscape. Applying the latest security updates remains crucial for mitigation. According to Symantec's protection bulletin, the best course of action to take to defend from exploitation is through VMware Carbon Black products. "The recommended policy at a minimum is to block all types of malware from executing (Known, Suspect, and PUP) as well as delay execution for cloud scan to get maximum benefit from VMware Carbon Black Cloud reputation service."

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More