Malware

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

RedEnergy is a sophisticated stealer-as-a-ransomware that was employed in attacks targeting energy utilities, oil, gas, telecom, and machinery sectors.

Zscaler ThreatLabz researchers discovered a new Stealer-as-a-Ransomware named RedEnergy used in attacks against energy utilities, oil, gas, telecom, and machinery sectors.

The malware allows operators to steal information from various browsers, it also supports ransomware capabilities.

Threat actors are distributing the threat masqueraded as fake web browser updates.

“The sample Stealer-as-a-Ransomware variant analyzed in this case study employs a deceptive FAKEUPDATES campaign to lure in its targets, tricking them into promptly updating their browsers. Once inside the system, this malicious variant stealthily extracts sensitive information and proceeds to encrypt the compromised files.” reads the analysis published by Zscaler.

Threat actors used reputable LinkedIn pages to target victims, including the Philippines Industrial Machinery Manufacturing Company and multiple organizations in Brazil. 

Threat actors employ a multi-stage attack chain, the attack starts when users click to visit the targeted company’s website through their LinkedIn profile.

The users are redirected to a rogue website that instructs them into installing a seemingly legitimate browser update. The downloaded file is an executable file known as RedStealer.

Regardless of which browser icon the user clicks on, they are redirected to the same URL (www[.]igrejaatos2[.]org/assets/programs/setupbrowser.exe) which downloads the file setupbrowser.exe.

“What makes this threat campaign even more insidious is the use of a deceptive download domain called www[.]igrejaatos2[.]org. This domain serves as a disguise, presenting itself as a ChatGpt site to lure victims into downloading a fake offline version of ChatGpt.” continues the analysis. “However, upon downloading the purported ChatGpt zip file, the victim unknowingly obtains the same malicious executable mentioned earlier.”

The RedEnergy sample analyzed by the researchers is written in .NET file, it supports advanced capabilities to evade detection and anti-analysis features. The malware communicates with the command and control servers through HTTPS.

The malware maintains persistence by storing the files in the Windows startup directory and creating an entry within the start menu (Start Menu\Programs\Startup).

The researchers also observed a suspicious activity involving File Transfer Protocol (FTP), a circumstance that suggests threat actors used the protocol for data exfiltration.

In the last stage of the attack, the stealer uses the ransomware modules to encrypt the user’s data. It appends the “.FACKOFF!” extension to encrypted files and deletes backups.

“The final stage of the malware execution involves the deletion of shadow drive data and Windows backup plans, solidifying its ransomware characteristics. A batch file is executed, and a ransom note is dropped, demanding payment in exchange for decrypting the files. Furthermore, the malware exhibits stealer functionalities, enabling the theft of user data.” concludes the report which also includes Indicators of Compromise (IOCs). “Overall, this analysis highlights the evolving and highly sophisticated nature of cyber threats targeting various industries and organizations. It emphasizes the critical importance of implementing robust security measures, fostering user awareness, and ensuring prompt incident response to effectively mitigate the impact of such attacks. By remaining vigilant and implementing comprehensive cybersecurity strategies, businesses can better protect themselves against these malicious campaigns and safeguard their valuable data.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, RedStealer)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Aisuru botnet is behind record 20Tb/sec DDoS attacks

A new Mirai-based IoT botnet, dubbed Aisuru, was used to launch multiple high-impact DDoS attacks…

3 hours ago

Everest group claimed the hack of Sweden’s power grid operator Svenska kraftnät

Hackers hit Sweden’s power grid operator Svenska kraftnät, stealing data via a file transfer tool.…

9 hours ago

Critical ASP.NET flaw hits QNAP NetBak PC Agent<gwmw style="display: none; background-color: transparent;"></gwmw>

QNAP warns of critical ASP.NET flaw (CVE-2025-55315) in NetBak PC Agent, letting attackers hijack credentials…

11 hours ago

Ransomware payments hit record low: only 23% Pay in Q3 2025

Only 23% of ransomware victims paid in Q3 2025, the lowest ever, continuing a six-year…

14 hours ago

X warns users to re-enroll passkeys and YubiKeys for 2FA by Nov 10

X urges users with passkeys or YubiKeys to re-enroll 2FA by Nov 10, 2025, or…

17 hours ago

Memento Labs, the ghost of Hacking Team, has returned — or maybe it was never gone at all.

Kaspersky links the first Chrome zero-day of 2025 to tools used in attacks attributed to…

1 day ago

This website uses cookies.