HomeNewsTechA contemporary– advanced Ransomware in the race

A contemporary– advanced Ransomware in the race


We independently research, test, review, and recommend the best products—learn more about our process. If you buy something through our links, we may earn a commission. learn more

Last Updated on 22/11/2021 by Riya

Windows’ Domain lost its penetrating power, after the discovery of a new attacking method namely PetitPotam NTLM relay. The method appeared for the first time in July, by a new ransomware gang named LockFile. The U.S. and Asian regions are the main assault targets, affecting organizations dealing with the following sectors- engineering, travel and tourism, business, legal and financial.

Tactics followed:

Security researchers at, a division of Broadcom, Symantec believes that the attackers gained access via Microsoft Exchange Servers, yet the original method remains dark. Then, they take over the company’s domain controller by applying the PetitPotam method, coercing authentication to isolate the NTLM relay under LockFile’s control.

Once the domain system is under control, they do whatever they want to. In July, it was discovered by security researcher Gilles Lionel, that the PetitPotam method comes up with various variants. Although through regular updates Microsoft tried to weaken it, but not completely block it.LockFile appears to be using an open-source code to misuse the original PetitPotam variant.

Similar to the gamechanger:LockFile appears to be similar to the one, who destroyed many organizations infiltrated their systems, and gained a lot of profit. Even their reference pattern to the Conti gang in the email address is non-hindered.


When analyzed closely, an attack chain appeared to the researchers. They spend at least few days on the network before releasing the malware and encrypting the file. To destroy the victim’s Exchange server they run a Power Shell command to download a file. Lastly, i.e.; before 20 to 30 minutes of malware release, they take over the domain controller via installing two files on the Exchange Server. Files-active_desktop_render.dllactive_desktop_launcher.exe (legitimate KuGou Active Desktop launcher)To dodge detection by the security software, the legitimate KuGou Active Desktop launcher is malfunctioned to load the malicious DLL.

DLL further tries to load and decrypt a file named “destop.ini” containing shellcode. In the Final Step, they copied the LockFile ransomware payload on the local domain controller and pushing it through the network with the help of script and executables.LockFile is an advanced version of ransomware, growing so rapidly would leave other ransomware groups behind.

Riya is a technology enthusiast and an avid researcher. She writes about consumer tech, hacking, and technology consumer issues at TheDigitalHacker.
- Advertisment -

Must Read

Data Science Drives Personalized Marketing and Customer Engagement to New Heights...

Personalized marketing and customer engagement are crucial for businesses to thrive in the current digital era. Because data science makes it possible for marketers...