EncryptHub Spreads Ransomware via Phishing and Fake Apps

EncryptHub is actively spreading ransomware and information stealers through phishing and fake apps. A recent report highlights how this threat actor deceives users.

The campaign began in mid-2024 and has compromised over 600 high-value targets. Attackers use phishing, trojanized applications, and Pay-Per-Install (PPI) services to distribute malware. Their goal is to steal credentials and deploy ransomware.

How the Attack Works

EncryptHub uses phishing emails, SMS messages, and phone calls to trick victims. Attackers pose as IT support and direct users to fake login pages. Victims unknowingly enter their VPN credentials, allowing hackers to gain access.

Another method involves trojanized apps disguised as legitimate software. Fake versions of Google Meet, WeChat, and Microsoft Visual Studio install malware upon download. Once executed, the malware runs scripts to steal cookies and sensitive information.

PPI services further expand the attack. EncryptHub reportedly pays for bulk malware installations, reaching thousands of devices. The malware then establishes persistence and deploys additional payloads.

The Growing Threat

Recent reports indicate EncryptHub is developing EncryptRAT, a tool to control infected devices. This system allows remote command execution and data theft. Researchers believe the group may sell this tool to other cybercriminals.

How to Stay Safe

Users should avoid downloading software from unknown sources. Always verify links before entering credentials and enable multi-factor authentication (MFA). Businesses should train employees to recognize phishing tactics and implement strong security policies.

By staying alert and following cybersecurity best practices, organizations can reduce the risk of ransomware attacks. Proactive defense is essential to counter evolving threats.

Sleep well, we got you covered.