Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Crypto-Stealing Campaign Deploys MortalKombat Ransomware
Crypto-Stealing Campaign Deploys MortalKombat Ransomware
Security

Crypto-Stealing Campaign Deploys MortalKombat Ransomware

October 9, 2023No Comments2 Mins Read

A new financial fraud campaign has been spotted using a variant of the Xorist commodity ransomware “MortalKombat,” together with a variant of the Laplas Clipper malware.

The cyber-attacks reportedly aimed to steal cryptocurrency from victims and mainly targeted victims in the United States but also in the United Kingdom, Turkey and the Philippines.

“Leveraging cryptocurrency offers threat actors attractive benefits such as anonymity, decentralization, and lack of regulation, making it more challenging to track,” Cisco Talos wrote in a Tuesday advisory.

The company said it discovered the actor scanning the internet for victim machines with an exposed remote desktop protocol (RDP) port. They then employed one of their download servers to run an RDP crawler and facilitated MortalKombat ransomware deployments.

From a technical standpoint, the attacks seen as part of this campaign start with a phishing email, which initiates a multi-stage attack chain in which the actor delivers either malware or ransomware, then deletes evidence of their malicious presence on the infected machine.

“The malicious ZIP file attached to the initial phishing email contains a BAT loader script,” reads the advisory.

Once victims run the loader script, it downloads another malicious ZIP file from an attacker-controlled hosting server to the victim’s machine, inflates it automatically and executes the payload (the GO variant of Laplas Clipper malware or MortalKombat ransomware).

“The loader script will run the dropped payload as a process in the victim’s machine, then delete the downloaded and dropped malicious files to clean up the infection markers,” Cisco Talos wrote. 

To defend against this campaign, Cisco Talos encouraged companies to be careful while performing cryptocurrency transactions.

See also  Platypus Finance recovers 90% of assets lost in exploit

Erich Kron, a security awareness advocate at KnowBe4, shared Cisco Talos’ security recommendations, adding that organizations should focus on email phishing defenses.

“Many organizations still allow .ZIP files as attachments, yet may not have a reason for most employees to be able to send this type of file,” Kron told Infosecurity in an email. “Because these types of archive files are used regularly when trying to spread malware, disallowing them could significantly improve the ability to defend against these campaigns.”

Phishing-based attacks were also at the center of a recent Cofense report, which suggested the use of Telegram bots as exfiltration destinations for phished information grew by 800% between 2021 and 2022.

Source link

Campaign CryptoStealing Deploys MortalKombat ransomware

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

TrueUSD was hacked and issued fake tokens

October 24, 2023

Security Engineer at Yuga Labs Under Investigation After Crypto Phishing Probe

September 29, 2023

Smart Meter Market to Reach US$ 37.2 Billion by 2030 at 9.5% CAGR; North America Holds 30%; Key Players: Landis+Gyr, Itron, Honeywell, Siemens, Kamstrup, Iskraemeco, Elster, ABB, Sensus, Schneider Electric

February 1, 2026

Type above and press Enter to search. Press Esc to cancel.