cyber daily logo

Breaking news and updates daily. Subscribe to our Newsletter

Breaking news and updates daily. Subscribe to our Newsletter X facebook linkedin Instagram Instagram

Memento ransomware threat actors demand $1m in bitcoin from victims

Sophos has released details of a new Python ransomware called Memento.

user icon Nastasha Tupas
Fri, 19 Nov 2021
Memento ransomware threat actors demand $1m in bitcoin from victims
expand image

The research, titled New Ransomware Actor Uses Password Protected Archives to Bypass Encryption Protection, describes the attack, which locks files in a password-protected archive if the Memento ransomware can’t encrypt the targeted data.

Human-led ransomware attacks in the real world are rarely clear cut and linear, according to Sean Gallagher, senior threat researcher at Sophos.

“Attackers seize opportunities when they find them or make mistakes, and then change tactics ‘on-the-fly'."


"If they can make it into a target’s network, they won’t want to leave empty-handed."

"The Memento attack is a good example of this, and it serves as a critical reminder to use defence-in-depth security," Gallagher said.

Attack timeline

Sophos researchers believe the Memento operators breached the target’s network in mid-April 2021.

The attackers exploited a flaw in VMware’s vSphere, an internet facing cloud computing virtualisation tool, to gain a foothold on a server, and the forensic evidence Sophos researchers found indicates the attackers started the main intrusion in early May 2021.

The attackers used the early months for lateral movement and reconnaissance, using the Remote Desktop Protocol (RDP), NMAP network scanner, advanced port scanner and Plink Secure Shell (SSH) tunneling tool to set up an interactive connection with the breached server. The attackers also used Mimikatz to harvest account credentials to use in later stages of the attack.

According to Sophos researchers, on 20 October 2021, the attackers used the legitimate tool WinRAR to compress a collection of files and exfiltrate them via RDP.

Release of the ransomware

The attacker first deployed the ransomware on 23 October 2021 and Sophos researchers found that the attackers initially tried to directly encrypt files, but security measures blocked this attempt.

The attackers then changed tactics, retooled and redeployed the ransomware. They copied unencrypted files into password-protected archives using a renamed free version of WinRAR, before encrypting the password and deleting the original files.

The attackers demanded a ransom of $1 million in bitcoin in order to restore the files. Fortunately, the target was able to recover data without the involvement of the attackers.

Open entry points let in additional attackers

While the Memento attackers were in the target’s network, two different attackers broke in via the same vulnerable access point, using similar exploits.

These attackers each dropped cryptocurrency miners onto the same compromised server. One of them installed an XMR crypto miner on 18 May while the other installed an XMRig cryptominer on 8 September and again on 3 October.

According to Gallagher, the longer vulnerabilities go unmitigated, the more attackers these attract.

“We’ve seen this repeatedly – when internet-facing vulnerabilities become public and go unpatched, multiple attackers will quickly exploit them," Gallagher said.

Security advice

Sophos researchers believe this incident, where multiple attackers exploited a single unpatched server exposed to the internet, highlights the importance of quickly applying patches and checking with third-party integrators, contract developers or service providers about their software security.

Following general best practices to help defend against ransomware and related cyber attacks is also recommended:

At a strategic level

Deploy layered protection. As more ransomware attacks begin to involve extortion, backups remain necessary, but insufficient. It is more important than ever to keep adversaries out in the first place, or to detect these quickly, before these cause harm.

Use layered protection to block and detect attackers at as many points as possible across an estate.

Combine human experts and anti-ransomware technology. The key to stopping ransomware is defence-in-depth that combines dedicated anti-ransomware technology and human-led threat hunting. Technology provides the scale and automation an organisation needs, while human experts are best able to detect the telltale tactics, techniques and procedures that indicate an attacker is attempting to get into the environment. If organisations don’t have the skills in-house, they can enlist support from cyber security specialists.

At a day-to-day tactical level

Monitor and respond to alerts. Ensure the appropriate tools, processes, and resources (people) are available to monitor, investigate and respond to threats seen in the environment. Ransomware attackers often time their strike during off-peak hours, at weekends or during the holidays, on the assumption that few or no staff are watching.

  • Set and enforce strong passwords. Strong passwords serve as one of the first lines of defence. Passwords should be unique or complex and never re-used. This is easier to accomplish with a password manager that can store staff credentials.
  • Use multi-factor authentication (MFA). Even strong passwords can be compromised. Any form of multi-factor authentication is better than none for securing access to critical resources such as e-mail, remote management tools and network assets.
  • Lock down accessible services. Perform network scans from the outside and identify and lock down the ports commonly used by VNC, RDP or other remote access tools. If a machine needs to be reachable using a remote management tool, put that tool behind a VPN or zero-trust network access solution that uses MFA as part of its login.
  • Practice segmentation and zero-trust. Separate critical servers from each other and from workstations by putting these into separate VLANs as you work towards a zero-trust network model.
  • Make offline backups of information and applications. Keep backups up to date, ensure their recoverability and keep a copy offline.
  • Inventory your assets and accounts. Unknown, unprotected and unpatched devices in the network increase risk and create a situation where malicious activities could pass unnoticed. It is vital to have a current inventory of all connected compute instances. Use network scans, IaaS tools and physical checks to locate and catalogue these and install end point protection software on any machines that lack protection.
  • Make sure security products are correctly configured. Under-protected systems and devices are vulnerable too. It is important that you ensure security solutions are configured properly and to check and, where necessary, validate and update security policies regularly. New security features are not always enabled automatically. Don’t disable tamper protection or create broad detection exclusions as doing so will make an attacker’s job easier.
  • Audit Active Directory (AD). Conduct regular audits on all accounts in AD, ensuring that none have more access than is needed for their purpose. Disable accounts for departing employees as soon as they leave the company.
  • Patch everything. Keep Windows and other operating systems and software up to date. This also means double checking that patches have been installed correctly and are in place for critical systems like internet-facing machines or domain controllers.

Detecting ransomware and attempted encryption is vital, but it’s also important to have security technologies that can alert IT managers to other unexpected activity such as lateral movement, according to Gallagher.

"Being breached by multiple attackers compounds disruption and recovery time for victims."

"It also makes it harder for forensic investigations to unpick and resolve who did what, which is important intelligence for threat responders to collect to help organisations prevent additional repeat attacks,” Gallagher said.

“Cyber criminals are continuously scanning the internet for vulnerable online entry points, and they don’t wait in line when they find one."

[Related: Defence industry and militaries need better network support for disconnected operations, report finds]

Nastasha Tupas

Nastasha Tupas

Nastasha is a Journalist at Momentum Media, she reports extensively across veterans affairs, cyber security and geopolitics in the Indo-Pacific. She is a co-author of a book titled The Stories Women Journalists Tell, published by Penguin Random House. Previously, she was a Content Producer at Verizon Media, a Digital Producer for Yahoo! and Channel 7, a Digital Journalist at Sky News Australia, as well as a Website Manager and Digital Producer at SBS Australia. Nastasha started her career in media as a Video Producer and Digital News Presenter at News Corp Australia.

cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.