LockerGoga

Malware updated a month ago (2024-10-15T10:01:38.539Z)
Download STIX
Preview STIX
LockerGoga is a type of malware, specifically ransomware, that infiltrates computer systems and holds data hostage until a ransom is paid. This malicious software was notably deployed in an attack against Norsk Hydro in March 2019. The malware was distributed by the threat group FIN6, which traditionally targeted payment card data from Point-of-Sale (POS) or eCommerce systems. However, they expanded their operations to include targeted ransomware attacks, such as those involving LockerGoga and Ryuk. FireEye's Mandiant Incident Response investigations and intelligence research have identified connections between FIN6 and multiple instances of these ransomware attacks. The deployment of LockerGoga involves the use of batch script files, with Psexec being used for executing batch and PowerShell scripts and the final execution of LockerGoga across as many devices as possible. The LockerGoga ransom note is presented to victims after the malware has been undetected in compromised systems for some time, often months. The criminals demand payment in bitcoin in exchange for decryption keys. The threat actors are affiliates of various ransomware operations, including LockerGoga, MegaCortex, HIVE, and Dharma, and are known for targeting large corporations. Despite the potential devastation caused by LockerGoga, there are defenses available. For instance, Panda Adaptive Defense, an advanced cybersecurity solution combining EPP and EDR systems, was able to detect LockerGoga via generic signatures, effectively protecting its customers from infection. If individuals or companies are affected by LockerGoga, tools are available to recover files for free. As the fight against ransomware continues, it is crucial to implement robust cybersecurity strategies to prevent future infections.
Description last updated: 2024-10-15T09:24:54.296Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Ransom
Malware
Encryption
PowerShell
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The MegaCortex Malware is associated with LockerGoga. MegaCortex is a type of malware known for its harmful effects on computer systems and devices. It was identified by Dragos, a cybersecurity firm, as having a relationship with another ransomware called EKANS. Both MegaCortex and EKANS have specific characteristics that pose unique risks to industriaUnspecified
7
The Hive Malware is associated with LockerGoga. Hive is a form of malware, specifically ransomware, designed to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, Hive can steal personal information, disrupt operations, or hold data hostagUnspecified
4
The WannaCry Malware is associated with LockerGoga. WannaCry is a type of malware, specifically ransomware, that made headlines in 2017 as one of the most devastating cyberattacks in recent history. The WannaCry ransomware exploited vulnerabilities in Windows' Server Message Block protocol (SMBv1), specifically CVE-2017-0144, CVE-2017-0145, and CVE-2Unspecified
2
The Ryuk Malware is associated with LockerGoga. Ryuk is a type of malware known as ransomware, which has been utilized by the threat group ITG23 for several years. This group has been notorious for crypting their malware, with crypters seen in use with other malware such as Trickbot, Emotet, Cobalt Strike, and Ryuk. In 2019, most ransomware invesUnspecified
2
Source Document References
Information about the LockerGoga Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
10 months ago
CERT-EU
a year ago
DARKReading
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
BankInfoSecurity
a year ago
InfoSecurity-magazine
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
Flashpoint
a year ago
MITRE
2 years ago
MITRE
2 years ago
MITRE
2 years ago
MITRE
2 years ago
MITRE
2 years ago
MITRE
2 years ago
GovCERT CH
2 years ago
Bitdefender
2 years ago