Arcus Media Ransomware Delete Backup, Clear Logs, Disable Remote After Lock The Files

The Arcus Media ransomware has emerged as a significant cybersecurity threat, employing advanced techniques to maximize disruption and hinder recovery efforts. Operating under a Ransomware-as-a-Service (RaaS) model, the group has targeted industries worldwide, including business services, retail, and media, since its debut in May 2024. Arcus Media ransomware demonstrates a highly technical approach to ensure […] The post Arcus Media Ransomware Delete Backup, Clear Logs, Disable Remote After Lock The Files appeared first on Cyber Security News.

Jan 31, 2025 - 05:09
 0
Arcus Media Ransomware Delete Backup, Clear Logs, Disable Remote After Lock The Files

The Arcus Media ransomware has emerged as a significant cybersecurity threat, employing advanced techniques to maximize disruption and hinder recovery efforts.

Operating under a Ransomware-as-a-Service (RaaS) model, the group has targeted industries worldwide, including business services, retail, and media, since its debut in May 2024.

Arcus Media ransomware demonstrates a highly technical approach to ensure operational impact and complicate defensive measures:-

  1. Privilege Escalation: If administrative access is unavailable, it uses the ShellExecuteExW API to re-execute itself with elevated privileges via the “runas” verb.
  2. Process Termination: It halts critical processes such as SQL servers and email clients using the CreateToolhelp32Snapshot API. Targeted processes include:
  • sqlservr.exe
  • msaccess.exe
  • mysqld.exe
  1. Selective Encryption: Files are encrypted using the ChaCha20 cipher, with RSA-2048 protecting encryption keys. Larger files (>2 MiB) undergo partial encryption for efficiency, and encrypted files are appended with [Encrypted].Arcus.
File extension after encryption:
[Encrypted].Arcus
  1. Backup Disruption: To prevent recovery, it executes commands like:
   vssadmin delete shadows /all /quiet
   wevtutil cl Security
   bcdedit /set {default} recoveryenabled no
  1. Persistence Mechanisms: The ransomware copies itself to C:\ProgramData\svccost.exe and attempts to establish registry-based persistence.

Halcyon analysts detected that the Arcus Media targets recovery mechanisms by deleting shadow backups and clearing event logs, ensuring victims face significant challenges in restoring their systems.

Its encryption process renders files inaccessible without the decryption key stored on attacker-controlled servers.

Double Extortion Tactics

Beyond encryption, Arcus Media exfiltrates sensitive data, threatening public leaks if ransom demands are unmet. This tactic amplifies pressure on victims by leveraging potential reputational damage.

The ransomware disables system defenses like Windows Firewall and event logging through commands:-

netsh advfirewall set currentprofile state off
wevtutil cl Security

Organizations can mitigate risks by maintaining offline backups to prevent ransomware access, implementing robust endpoint detection and response (EDR) solutions, and educating employees on phishing risks, as initial access often starts with malicious emails.

Indicators of Compromise

  • Encrypted files with [Encrypted].Arcus extensions.
  • Presence of ransom notes named Arcus-ReadMe.txt.
  • Processes terminated abruptly or system slowdowns.

Collect Threat Intelligence with TI Lookup to Improve Your Company’s Security - Get 50 Free Request

The post Arcus Media Ransomware Delete Backup, Clear Logs, Disable Remote After Lock The Files appeared first on Cyber Security News.