• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Latest Cybersecurity News

RansomBoggs ransomware targets Ukrainian Organizations powered by Sandstorm

William Marshal Posted On November 26, 2022
0



RansomBoggs Ransomware

A new set of ransomware attacks under have been identified targeting Ukraine and it has seemed to have been coming from the Russian military threat group called Sandworm.

Slovakian software company ESET first identified this wave of ransomware attacks, has named the ransomware to be RansomBoggs, and mentioned that this ransomware is found in several Ukrainian network recently.

The ESET researchers said “While the malware written in .NET is new, its deployment is similar to previous attacks attributed to Sandworm.

There are similarities with previous attacks conducted by Sandworm, a PowerShell script used to distribute the .NET ransomware from the domain controller is almost identical to the one seen last April during the Industroyer2 attacks against the energy sector.”

Modus Operandi of RansomBoggs ransomware

RansomBoggs ransomware is deployed as a payload using a PowerShell script called POWERGAP and it is the same one behind the CaddyWiper malware that was deployed against Ukraine in March 2022.

After successfully deployed into a network, RansomBoggs ransomware encrypts files using a AES-256 with CBC mode using a randomly generated encryption key and it appends with .chsch extension to encrypt file extensions.

RansomBoggs ransomware
Source: ESET research

Based on the RansomBoggs ransomware version, the RSA public key can either be hardcoded inside it or be given as an argument. On the infected systems, the RansomBoggs ransomware delivers a ransom note impersonating James P.Sullivam, a character from the Mosters Inc movie.

Furthermore, a few weeks before Microsoft also mapped the Sandworm cyber-espionage group to Prestige ransomware attacks that targeted logistics industry in Poland and Ukraine.

RansomBoggs ransomware and Sandworm hackers

Sandworm is an elite group of Russian hackers that have been active for more than 20 years now with being a part of Unit 74455 of the Russian GRU’s Main Center for Special Technologies.

Sandworm has been involved in the KillDisk wiper attacks hitting Ukraine caused blackouts in 2015 and 2016.

Moreover, it is believed that Sandworm were the ones behind the development of NotPetya ransomware that hit the world in June 2017 right after the WannaCry incident.

Russian hackers have been heavily involved in cyberattacks on Europe and other countries, stealing 50 million passwords recently.

Also, Russian Killnet entity launched a DDOS on European Parliament this week and here the Russian malicious bodies are on to Ukrainian organizations again.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


CybersecurityRansomwareRansomware attack


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search