×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET Research analyzes the Spacecolon toolset that spreads ransomware around the world and steals sensitive data

Customer Press Room

ESET Research analyzes the Spacecolon toolset that spreads ransomware around the world and steals sensitive data

by Grandangolo Communications / Friday, 08 September 2023 / Published in Eset

Spacecolon distributes variants of the Scarab ransomware, which ESET believes is of Turkish origin. The largest detections in European countries, including Italy, in Türkiye and Mexico. Spacecolon acts as a remote access trojan with the ability to extract sensitive data and/or distribute the Scarab ransomware

ESET, a global European leader in the cybersecurity market, has published analysis of Spacecolon, a small toolset used to deploy variants of the Scarab ransomware around the world. The tool likely penetrates organizations through operators compromising vulnerable web servers or RDP credentials through brute forcing. Several versions of Spacecolon contain code sequences compiled in Turkish that ESET believes to be the work of a Turkish-speaking developer. ESET has managed to trace the origins of Spacecolon from May 2020 to the present. To represent the connection with “space” and the “beetle”, ESET gave Spacecolon operators the name CosmicBeetle.

Spacecolon incidents identified by ESET telemetry are widespread across the world, with a high prevalence in European Union countries, such as Italy, Spain, France, Belgium, Poland and Hungary; Furthermore, ESET has detected a high prevalence in Türkiye and Mexico. CosmicBeetle appears to be preparing the distribution of a new ransomware, ScRansom. After the compromise, in addition to installing the ransomware, Spacecolon offers a large variety of third-party tools that allow attackers to disable security products, extract sensitive information, and gain further access.

“We did not observe any default pattern by which Spacecolon chose its victims, other than their vulnerability to the initial access methods used by CosmicBeetle. Nor did we find any correlation with focus areas or goal sizes. However, to name a few examples (by type and geography), we observed Spacecolon in a hospital and tourist resort in Thailand, in an insurance company in Israel, in a local government institution in Poland, in an area entertainment operator in Brazil, in an environmental services company in Turkey and in a school in Mexico,” he explains Jakub Souček, ESET researcher and author of the analysis.

CosmicBeetle likely compromises web servers exposed to the ZeroLogon vulnerability or those with RDP credentials that it is able to crack. Additionally, Spacecolon can provide backdoor access to its operators. CosmicBeetle makes no effort to hide malware and leaves numerous artifacts on compromised systems.

After compromising a web server, CosmicBeetle distributes ScHackTool, the main component of Spacecolon used by CosmicBeetle. It relies heavily on the graphical interface and the active participation of its operators; allows them to orchestrate the attack, downloading and running additional tools on the compromised machine on demand, as they see fit. If the target is deemed valuable, CosmicBeetle can deploy ScInstaller and use it, for example, to install ScService, which provides additional remote access.

The latest payload deployed by CosmicBeetle is a variant of the Scarab ransomware that internally implements a ClipBanker, a type of malware that monitors the contents of the clipboard and changes what it believes may be a cryptocurrency wallet address to an address controlled by the attacker.

Additionally, a new family of ransomware is under development, samples of which were uploaded to VirusTotal from Turkey. ESET Research called it ScRansom and believes, with extreme certainty, that it was written by the same developers as Spacecolon. ScRansom attempts to encrypt all hard, removable and remote drives. ESET has not yet observed this ransomware in action as it appears to still be in development.

For more technical information on Spacecolon and CosmicBeetle, check out the blog post “Scarabs colon-izing vulnerable servers” su WeLiveSecurity.

Tagged under: Eset, Spacecolon

About Grandangolo Communications

What you can read next

ESET MSP specialized research partners and investing in advanced cybersecurity solutions
ESET Research discovers EvilVideo: Telegram app for Android was the target of a zero-day exploit that sends malicious videos
ESET was recognized as a Top Player in Radicati's 2024 Market Quadrant for the APT Protection segment

Customer Press Room

  • VERTIV presents the range of overhead prefabricated infrastructures on a global level, to accelerate the implementation of data centers

    VERTIV ™ Smartrun facilitates installation ...
  • Axiante is a partner of the "Virtual Job Meeting Stem Girls" event

    Participation in the initiative dedicated to ...
  • Vertivia enhances the pre-engineered solution of data centers for EMEA Edge Computing to promote energy efficiency and fastest on-site installations

    La nuova soluzione Vertiv™ SmartAisle&#x...
  • ESET expands the Cyber ​​Threat Intelligence: new feeds and APT reports for companies of all sizes

    Announced at ESET World 2025, the expansion of ...
  • Sentinelone gives a change to the role of partners with the new Global Partnerone Program

    The program provides partners with the tools, ...

Archives

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • abstract
  • Abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP