Categories: InfoSec News

Vice Society Expands Its Armory with Custom-Branded Payload PolyVice

Published by
RiSec.Mitch

Vice Society ransomware gang, which targeted dozens of educational institutions only this year, is now using a new custom-branded ransomware payload in its recent cyberattacks. The ransomware variant, dubbed PolyVice, was first seen in the wild in July, however, the group started using this variant in late September.

PolyVice: the new encryptor

According to a report by SentinelOne researchers, PolyVice is a 64-bit binary that uses a hybrid encryption scheme.

  • The scheme combines asymmetric encryption with the NTRUEncrypt algorithm and symmetric encryption with the ChaCha20-Poly1305 algorithm.
  • Vice Society group has used intermittent encryption or partial encryption technique, where small chunks of files are encrypted instead of encrypting the entire file.
  • This leaves the data unusable within a fraction of the time required in comparison to encrypting the entire file.

Modus operandi

PolyVice utilizes a multi-threading approach that runs the encryption process via parallel processing on the victim’s processor. 

  • Each worker node of this parallel processing further analyzes the size of the targeted file to optimize the speed for faster encryption.
  • Files smaller than 5 MB are fully encrypted and bigger files are partially encrypted.  For files between 5 MB and 100 MB, two chunks of 2.5 MB are encrypted, while for larger files, 10 chunks of 2.5 MB each are encrypted across the file.
  • It adds .ViceSociety file extension to all encrypted files and drops ransom notes with the file name AllYFilesAE in each encrypted directory. Moreover, each PolyVice worker adds information necessary for decryption at the file footer.

Code similarities and differences

PolyVice has extensive code similarities with the payloads of the Chily ransomware and SunnyDay ransomware.

  • All these payloads have 100% matched functions and identical executable codebase, however, PolyVice contains some additional new functions.
  • The differences can be noticed in campaign-specific details such as the file extension, hardcoded master key, wallpaper, ransom note name, and content.
  • Moreover, researchers observed some debugging messages in PolyVice’s codebase, suggesting that the Vice Society group’s own ransomware implementation is in its early stage of development. 

A common code base shared among multiple malware (PolyVice, Chily, and SunnyDay) opens up several doors of possibilities to researchers.

Shedding lights on possibilities

  • The Vice Society may have sourced PolyVice from a vendor or a commodity ransomware builder who supplies similar tools to other ransomware groups.
  • There may be some ransomware developers operating a Locker-as-a-Service that provides a builder that allows buyers (Vice Society being one of them) to independently generate any number of customized lockers/decryptors and run its own RaaS programs.
  • At last, Vice Society, SunnyDay, and Chily ransomware could be byproducts of the same group.

Conclusion

The use of PolyVice indicates that the group is strengthening its ransomware campaigns by using its own expertise, such as the use of stronger encryption algorithms and better intermittent encryption methods. Vice Society has a history of deploying third-party ransomware in its intrusions, including HelloKitty, Five Hands, and Zeppelin. These ransomware implemented a weak encryption scheme that allowed for the decryption of locked files, potentially motivating the group to adopt a new locker and a robust encryption scheme.

Suggest an edit to this article

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmark Close
Social Comments Box
Share the word, let's increase Cybersecurity Awareness as we know it

This post was last modified on 25 December 2022 7:17 PM

RiSec.Mitch

Just your average information security researcher from Delaware US.

Leave a Comment
Published by
RiSec.Mitch
Tags: malware ransomware

Recent Posts

  • Data Breach News
  • InfoSec News

WH Smith Announces Cyber-Attack: Employee Data Stolen

British high street chain WH Smith has recently revealed that it was hit by a…

2 years ago
  • InfoSec News
  • World Affairs

Voice ID: How Secure is it Really?

As banks worldwide roll out Voice ID as a means of user authentication over the…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

What distinguishes Application Security from API Security?

In the era of digital transformation, cybersecurity has become a major concern for businesses. When…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

The Top 5 Cybersecurity threats facing Businesses Today

In today's digital age, cybersecurity threats have become a significant concern for businesses of all…

2 years ago
  • InfoSec News
  • World Affairs

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…

2 years ago
  • Cybersecurity Academy

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…

2 years ago