Skip to content
Detecteam
  • CompanyExpand
    • Founders Story
    • The Team
  • ProductExpand
    • About Us
  • SolutionsExpand
    • Use Cases
  • ResourcesExpand
    • Detecteam Blogs
    • Contact Us
Twitter Linkedin
Detecteam
Blog · Scenario

Adhubllka ransomware

Avatar photoByDetecteam 2023-09-142023-09-14

TLP

TLP CLEAR

Author

Jordi M. Lobo

Summary

A new ransomware variant has emerged as part of the Adhubllka ransomware family, targeting individuals and small enterprises with smaller ransom demands to evade media attention. The ransomware spreads via phishing emails and employs a victim portal on Tor for decryption key delivery after ransom payment. Adhubllka has been previously mislabeled and associated with various aliases, used by threat groups like TA547 in campaigns targeting diverse sectors. Researchers anticipate potential rebranding of the Adhubllka family and its adoption by other cybercriminal groups. This underscores the need for robust endpoint security measures to combat evolving ransomware threats effectively.

TIMELINE

DATA

We are consistently providing data for attacks weekly hoping to contribute raising awareness to threats from their data.

windows_security.xml_Download

CATEGORY

Ransomware

references

  • https://netenrich.com/blog/discovering-the-adhubllka-ransomware-family
  • https://howtofix.guide/adhubllka-virus/
  • https://medium.com/coinmonks/discovering-adhubllka-ransomware-family-tracing-roots-of-lolkek-bit-obz-u2k-tzw-variants-ce77d2461ac7

MITRE ATT&CK

Post Tags: #T1027 - Obfuscated Files or Information#T1036 - Masquerading#T1055 - Process Injection#T1056 - Input Capture#T1057 - Process Discovery#T1080 - Taint Shared Content#T1082 - System Information Discovery#T1083 - File and Directory Discovery#T1090 - Proxy#T1091 - Replication Through Removable Media#T1120 - Peripheral Device Discovery#T1124 - System Time Discovery#T1158 - Steal or Forge Kerberos Tickets#T1406.002 - Software Packing#T1486 - Data Encrypted for Impact#T1497 - Virtualization/Sandbox Evasion#T1518.001 - Software Discovery: Security Software Discovery#T1560 - Archive Collected Data#T1562.001 - Altering Malware#T1573 - Encrypted Channel
Avatar photo
Detecteam
X

Detecteam is transforming cybersecurity detection from static rule-writing to autonomous, continuous validation. Our REFLEX platform automates the detection lifecycle—building, testing, validating and deploying detections in minutes, not months. We help enterprises maximize ROI on existing tools, close high-risk detection gaps faster, and scale security outcomes without scaling headcount. This is the future of detection-as-code, and we’re leading it.

CONTACT US

Detecteam Inc.
300 Lenora Street PMB 659
Seattle, WA 98121 USA
+1 (650) 542-0831
sales@detecteam.com

  • Privacy Policy

SOCIAL MEDIA

Twitter Linkedin
OUR NEWSLETTER

Check your inbox or spam to confirm your subscription.

© 2025 Detecteam Inc. All Rights Reserved.

  • Company
    • Founders Story
    • The Team
  • Product
    • About Us
  • Solutions
    • Use Cases
  • Resources
    • Detecteam Blogs
    • Contact Us
Search