Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Most Active Ransomware Strains Targeting Enterprise Networks

By David Balaban
ransomware
June 4, 2020

Although the ransomware plague took a nosedive in terms of the victim count years ago, it’s still alive and kicking. It used to home in on any computers indiscriminately, but at some point, the malicious actors realized they could squeeze a lot more profit out of the enterprise than out of individual users. This shift made businesses the most coveted target for ransomware operators.

According to a study by Beazley Breach Response (BBR), a subsidiary of London-based insurance services giant, 71 percent of ransomware attacks reported by the company’s customers in 2018 targeted small and medium-sized businesses. The researchers believe the reason is that SMBs typically have lower information security budgets than large companies, which turns many of them into low-hanging fruit for cybercriminals to go after.

In addition to rethinking the range of intended victims, criminals have changed their attack vectors as well. Spam doesn’t dominate the payload delivery repertoire anymore. It has been largely superseded by more sophisticated techniques, including remote desktop protocol (RDP) exploitation, managed service provider (MSP) hacks, spear-phishing, attacks on relatively safe Apple devices.

To give you the big picture, this article will provide insights into some of the most active ransomware strains that focus on hitting enterprise networks.

 

1. Mailto (aka Netwalker Ransomware)

Originally discovered in August 2019, this file-encrypting culprit remained mostly dormant until early February 2020 when Australian transportation company Toll Group reported a serious ransomware incident. On a side note, this firm employs about 40,000 people and has offices in more than 50 countries. Its gross earnings amounted to $127 million last year, so it’s a juicy target from a cybercriminal’s perspective.

The binary of this ransomware arrived under the guise of Sticky Password, a popular password manager. Once executed, the offending code raided multiple systems constituting the IT network of Toll Group, crippling data via strong encryption and staining all affected files with *.mailto extension (hence the researchers-coined name of the sample).

This string is additionally concatenated with the attackers’ email address so that the company can negotiate the decryption terms directly. By the way, security analysts found that the developers of this ransomware call it “Netwalker,” based on the name of the decrypt tool touted by the malefactors.

The size of the ransom demanded by the extortionists hasn’t been disclosed, and Toll Group appears to have rejected these demands. In response to the incident, the executives had to shut down the affected services. The company partially switched to manual operation for handling critical business processes. The booking and tracking platform are still offline at the time of this writing.

 

2. Snake Ransomware

This enterprise-hunting specimen surfaced in January 2020. It stands out from the crowd due to high-level obfuscation techniques that allow it to stay undetected. After gaining a foothold in a business environment, this ransomware terminates virtual machines, SCADA systems, network maintenance tools and industrial control systems if found. Then, it encrypts valuable data while skipping files in Windows system directories.

Once the crypto implementation part is completed, the infection appends a random five-character extension to the original filenames and drops a ransom note called “Fix-Your-Files.txt.” This document includes a phrase, “We breached your corporate network,” which clearly indicates what kind of targets the cyberattackers zero in on.

When analyzing the inner structure of encrypted data, researchers discovered that the ransomware adds a file marker that says “EKANS.” That’s SNAKE if you read it backward, which explains why this sample is called that way.

 

3. Ragnar Locker

To spread this ransomware, attackers compromise remote management and monitoring (RMM) software and other applications commonly leveraged by managed service providers (MSPs). If this hack is successful, it becomes a launchpad for infiltrating the network of a company doing business with the breached MSP.

First spotted in late December 2019, Ragnar Locker uses the RSA-2048 key to mutilate files. After the asymmetric cipher is applied, the ransomware blemishes filenames with *.ragnar extension followed by a unique victim ID and generates a ransom note named “RGNR_[file extension].txt.” Interestingly, this document looks customized and includes the affected company’s name and victim-specific ransom amount that may reach $600,000 worth of Bitcoin.

An additional issue with Ragnar Locker is that it steals sensitive data from a target organization as part of the attack. In case the company refuses to pay the ransom for decryption, the criminals engage an extra blackmail scenario and threaten to release these files via publicly accessible sources.

 

4. Zeppelin Ransomware

This strain was discovered in November 2019. It is a spinoff of a lineage that previously gave rise to samples called VegaLocker and Buran distributed via a Ransomware-as-a-Service (RaaS) model. Researchers have traced this family back to a Russian cybercrime gang.

The operators of Zeppelin ransomware focus on attacking tech and healthcare organizations based in the United States and Europe. If the harmful program determines that it has infiltrated a network located in one of the post-Soviet countries (e.g., Russia, Ukraine, Belarus, or Kazakhstan), the attack discontinues.

The primary vector of compromise comes down to exploiting unsecured remote desktop services. When up and running inside a host network, it finds a totality of important files and encrypts them without modifying the original filenames. Meanwhile, it skews the hexadecimal structure of data and adds the “Zeppelin” file marker. The ransom note is a document named “!!! All your files are encrypted !!!.txt”.

Later on, analysts came across a builder application that allows Zeppelin ransomware distributors to generate custom variants of the program that go with unique rescue notes. The tool also provides the perpetrators with several different payload formats to choose from, including *.exe, *.dll, and *.ps1.

 

5. TFlower Ransomware

The strain dubbed TFlower splashed onto the scene in late July 2019. It infects organizations through unprotected or poorly secured RDP ports. As soon as the furtive infiltration takes place, the ransomware runs a number of commands to disable Volume Shadow Copy Service (VSS) and thereby thwart easy data recovery. When traversing the plagued computers for valuable data to be encrypted, it ignores critical system files and objects stored in the Sample Music folder.

This pest does not modify the names of hostage files. However, when analyzed using a hex editor, every encrypted item turns out to have a “tflower” file marker at the beginning of its deep-level data representation. The ransomware also sprinkles a bevy of rescue notes named “!_Notice_!.txt” across all affected folders. Although TFlower ransomware doesn’t appear to be a particularly sophisticated sample, it encrypts files flawlessly and thus poses a serious risk to companies.

 

6. MegaCortex Ransomware

This one made its debut in May 2019. It mainly targets businesses located in the US, Canada, the Netherlands, and France. According to security experts’ findings, MegaCortex affects enterprise networks previously compromised by notorious info-stealing Trojans called Qakbot and Emotet. This fact suggests that the distribution of this ransomware might rely on backdoors created by other malware in a business ecosystem.

When inside, the harmful program executes a modified version of the PsExec remote administration tool. It allows the threat actors to run a specially crafted batch file on contaminated systems and move on to an active phase of the onslaught.

Having scanned the company’s workstations for all forms of potentially important data, the pest executes the encryption process and appends *aes128ctr extension to each file. It also drops a document named “!!!_READ_ME_!!!.txt” that provides ransom instructions. To evade detection, MegaCortex scours the network for mainstream security tools and disables them once spotted.

 

Strategizing 

In light of the rapidly escalating issue of ransomware attacks that target the enterprise, the mantra about an effective data backup strategy now makes more sense to organizations than ever before. Additionally, businesses need to harden their defenses against this form of malicious code. A good starting point is to check the network for crudely secured RDP connections and patch the loopholes if found.

Also, the employees should learn to identify a phishing attack and refrain from clicking on suspicious links or opening sketchy email attachments. It’s also worthwhile to use an intrusion detection system (IDS) and reliable anti-malware solutions that can stop most ransomware attacks in their tracks.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: cyber security data protection information security ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David balaban

David Balaban is a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation. David runs the Privacy-PC.com project which presents expert opinions on contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy, and white hat hacking. As part of his work at Privacy-PC, Mr. Balaban has interviewed such security celebrities as Dave Kennedy, Jay Jacobs and Robert David Steele to get firsthand perspectives on hot InfoSec issues. David has a strong malware troubleshooting background, with the recent focus on ransomware countermeasures.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0219-pen-Feat-slide1_900px

    11 Types of Spoofing Attacks Every Security Professional Should Know About

    See More
  • cyber threat

    Are you Ready for These 26 Different Types of DDoS Attacks?

    See More
  • ransomware

    Conti ransomware attacks impact healthcare and first responder networks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!