SentinelOne VS GlobeImposter – Detection and Response
GlobeImposter ransomware has been in existence since 2016. It is usually distributed through phishing emails containing malicious or links to such attachments. Over the years, GlobeImposter has evolved, with new versions and variations emerging regularly. The name “GlobeImposter” comes from its mimicry of Globe ransomware payloads. Other attacks have also used GlobeImposter. For example, in 2017, TA505 used GlobeImposter to extend the reach and effectiveness of its campaigns.
Another way that GlobeImposter ransomware has been distributed is through well-known botnets. In 2017, it was distributed via the Necurs botnet as a later-stage infection. This occurred as part of multiple spam campaigns that included 7zip archives. The archives contained malicious JavaScript that would download and launch the ransomware.
Using botnets to distribute GlobeImposter highlights the importance of having a multi-layered cybersecurity approach. A solution that can detect and prevent phishing attacks and botnet infections is necessary to protect against this evolving threat.