Malware
July 8, 2024

Emerging Eldorado Ransomware Targets Windows and VMware ESXi VMs

In March, a new ransomware-as-a-service (RaaS) operation named Eldorado emerged, targeting both Windows and VMware ESXi virtual machines. Since its debut, Eldorado has claimed 16 victims across various sectors, including real estate, education, healthcare, and manufacturing, primarily in the U.S.

Researchers from Group-IB have been closely monitoring Eldorado’s activities. The operators of Eldorado have been promoting their malicious service on RAMP forums and actively seeking skilled affiliates to expand their reach. Additionally, Eldorado runs a data leak site listing its victims, though this site was not accessible at the time of the report.

Technical Details

Eldorado ransomware is written in Go and is capable of encrypting files on both Windows and Linux platforms through its distinct variants. The ransomware features extensive operational similarities between the two variants.

The developers provided an encryptor to the researchers, complete with a user manual. This manual outlines the availability of 32-bit and 64-bit variants for VMware ESXi hypervisors and Windows operating systems. Group-IB notes that Eldorado is a unique development, not relying on any previously published builder sources.

Encryption Mechanism

Eldorado uses the ChaCha20 algorithm for encryption, generating a unique 32-byte key and 12-byte nonce for each locked file. These keys and nonces are then encrypted using RSA with Optimal Asymmetric Encryption Padding (OAEP). After encryption, files are given the “.00000001” extension, and ransom notes titled “HOW_RETURN_YOUR_DATA.TXT” are placed in the Documents and Desktop folders.

The ransomware extends its impact by encrypting network shares via the SMB protocol and deletes shadow volume copies on compromised Windows machines to prevent data recovery. To ensure the system remains operational, Eldorado skips over DLL, LNK, SYS, and EXE files, as well as essential system directories. Additionally, it is designed to self-delete by default to evade detection and analysis.

Customisation and Impact

Group-IB’s infiltration into the Eldorado operation revealed that affiliates can customise their attacks. On Windows, attackers can specify directories to encrypt, skip local files, target network shares on specific subnets, and even prevent the malware from self-deleting. On Linux, customisation is limited to setting directories for encryption.

Defence Recommendations

Group-IB emphasises that Eldorado represents a new, standalone ransomware threat, not a rebranding of an existing group. To mitigate the risks posed by ransomware like Eldorado, they recommend the following defences:

• Implement Multi-Factor Authentication (MFA): Use credential-based access solutions to enhance security.

• Use Endpoint Detection and Response (EDR): Quickly identify and respond to ransomware indicators.

• Regular Data Backups: Take backups regularly to minimise damage and data loss.

• AI-Based Analytics and Advanced Malware Detonation: Employ these tools for real-time intrusion detection and response.

• Regular Security Patching: Prioritise and periodically apply patches to fix vulnerabilities.

• Employee Training: Educate and train employees to recognise and report cyber security threats.

• Annual Technical Audits: Conduct regular security assessments and maintain digital hygiene.

• Avoid Paying Ransom: Paying ransom rarely ensures data recovery and can lead to further attacks.

By following these recommendations, organisations can bolster their defences against the evolving threat of ransomware.

All Posts

Let's talk

We’re here to help! Submit your information or call the office on +44 (0)1243 670 854 and a member of our team would be happy to help.

Who are Cybaverse?
How can we support your business?
Why work with us?