WastedLocker Ransomware: In-Depth Analysis, Detection, Mitigation, and Removal
Summary of WastedLocker Ransomware
WastedLocker emerged in April 2020. The name “WastedLocker” is derived from the “.wasted” extension appended to affected files. WastedLocker operators have been observed utilizing the SocGholish framework, a JavaScript-based framework that allows attackers to spread malware payloads masquerading as system or software updates.
What Does WastedLocker Ransomware Target?
WastedLocker ransomware targets a wide range of industries, including finance, healthcare, transportation, energy, manufacturing, media, entertainment and technology.
How Does WastedLocker Ransomware Spread?
WastedLocker has been distributed via phish/email. These malicious emails usually contain malicious attachments, or links to payloads on malicious sites. Operators of WastedLocker ransomware have also utilized Cobalt Strike to distribute the payloads. WastedLocker operators have used the SocGholish framework to spread malware.
WastedLocker Ransomware Technical Details
WastedLocker tends to run with administrative privileges, and will try to elevate them if it is executed without them. It then copies a random file from System32 and adds it to the %APPDATA% folder with a hidden and random name. This allows WastedLocker to copy itself as an alternate data stream (ADS). It encrypts files using RSA4096 and AES (CBC mode).
When WastedLocker is deployed via SocGholish, Cobalt Strike is used to gain additional information on the targets. It also disables Windows Defender features and deletes Volume Shadow Copies. Furthermore, LOTL-style tools, PsExec, PowerShell, and WMIC are commonly used to profile the environment and launch the ransomware.
How to Detect WastedLocker Ransomware
- The SentinelOne Singularity XDR Platform can identify and stop any malicious activities and items related to WastedLocker.
In case you do not have SentinelOne deployed, detecting ransomware requires a combination of technical and operational measures designed to identify and flag suspicious activity on the network. This allows the organization to take appropriate action, and to prevent or mitigate the impact of the ransomware attack.
To mitigate the risk of this Ransomware without SentinelOne deployed, it is important to take a multi-layered approach, which includes the following steps:
- Use anti-malware software or other security tools capable of detecting and blocking known ransomware variants. These tools may use signatures, heuristics, or machine learning algorithms, to identify and block suspicious files or activities.
- Monitor network traffic and look for indicators of compromise, such as unusual network traffic patterns or communication with known command-and-control servers.
- Conduct regular security audits and assessments to identify network and system vulnerabilities and ensure that all security controls are in place and functioning properly.
- Educate and train employees on cybersecurity best practices, including identifying and reporting suspicious emails or other threats.
- Implement a robust backup and recovery plan to ensure that the organization has a copy of its data and can restore it in case of an attack.
How to Mitigate WastedLocker Ransomware
- The SentinelOne Singularity XDR Platform can return systems to their original state using either the Repair or Rollback feature.
If you do not have SentinelOne deployed, there are several steps that organizations can take to mitigate the risk of WastedLocker ransomware attacks.
Educate Employees
Employees should be educated on the risks of ransomware, and on how to identify and avoid phishing emails, malicious attachments, and other threats. They should be encouraged to report suspicious emails or attachments, and to avoid opening them, or clicking on links or buttons in them.
Implement Strong Passwords
Organizations should implement strong, unique passwords for all user accounts, and should regularly update and rotate these passwords. Passwords should be at least 8 characters long, and should include a combination of uppercase and lowercase letters, numbers, and special characters.
Enable Multi-factor Authentication
Organizations should enable multi-factor authentication (MFA) for all user accounts, to provide an additional layer of security. This can be done through the use of mobile apps, such as Google Authenticator or Microsoft Authenticator, or through the use of physical tokens or smart cards.
Update and Patch Systems
Organizations should regularly update and patch their systems, to fix any known vulnerabilities, and to prevent attackers from exploiting them. This includes updating the operating system, applications, and firmware on all devices, as well as disabling any unnecessary or unused services or protocols.
Implement Backup and Disaster Recovery
Organizations should implement regular backup and disaster recovery (BDR) processes, to ensure that they can recover from ransomware attacks, or other disasters. This includes creating regular backups of all data and systems, and storing these backups in a secure, offsite location.
The backups should be tested regularly, to ensure that they are working, and that they can be restored quickly and easily.
WastedLocker Ransomware FAQs
What is WastedLocker Ransomware?
WastedLocker is a type of ransomware that locks up files on a computer and demands money to unlock them. It often sneaks in through fake emails or infected downloads. Once it’s inside, it scrambles files so they can’t be opened. The name comes from the “.wasted” extension added to encrypted files. You can avoid it by being careful with email attachments and keeping your security software up to date.
Who is behind WastedLocker Ransomware?
WastedLocker is believed to be operated by a cybercriminal group known as Evil Corp. This group has been involved in other online crimes, including stealing banking information. They usually go after large companies that can afford big ransom payments. You can reduce your chances of being targeted by using strong passwords, limiting access to important files, and teaching employees to recognize suspicious emails or links.
Which operating systems does WastedLocker target?
WastedLocker mainly attacks Windows-based systems, which are used by most businesses. Hackers find weak spots in networks to sneak the ransomware onto company servers. So far, there’s no major evidence of it affecting Mac or Linux computers. You can keep your Windows system safe by installing updates, disabling unused remote access tools, and running security scans regularly to catch anything suspicious before it spreads.
What happens when WastedLocker Ransomware infects a system?
When WastedLocker gets into a system, it scans for important files and encrypts them, making them impossible to open. It then leaves a ransom note demanding payment, usually in cryptocurrency. Unlike some ransomware, it doesn’t steal data—just locks it up. You can prepare for this kind of attack by keeping backups on separate devices or cloud storage so you won’t have to pay to get your files back.
What types of files does WastedLocker encrypt?
WastedLocker can encrypt just about anything—documents, spreadsheets, databases, and even backup files. It targets anything that might be valuable to a company or an individual. The locked files usually get a “.wasted” extension. You can protect your files by backing them up regularly and making sure at least one backup is stored offline, where it can’t be reached if your system gets infected.
How can businesses protect themselves from WastedLocker Ransomware?
Businesses can stay safe from WastedLocker by training employees to avoid phishing emails, keeping security patches up to date, and limiting access to important systems. You can also use strong passwords and multi-factor authentication to make it harder for hackers to break in. Having offline backups is a must—if an attack happens, you’ll have a way to restore your data without paying a ransom.
What security best practices help prevent a WastedLocker infection?
Good security habits can make a big difference. You can avoid ransomware by using strong passwords, blocking suspicious email attachments, and keeping all software updated. Restricting access to sensitive files also helps, so only trusted users can change important data. Regularly backing up files on a separate drive or secure cloud storage ensures you won’t lose everything if ransomware strikes.