New Dangerous and Persistent "Metamorphic" Malware Strain Called Tardigrade



Google Ads MalwareMichael Kan at PCMag reported on this new strain of Windows malware.  It can constantly adapt to avoid detection and was first found targeting the biotech industry, including the infrastructure behind vaccine manufacturing, according to security researchers.

The warning comes from a non-profit called BIO-ISAC, which focuses on information sharing to protect the biotech industry from cybersecurity threats.

The threat is setting off alarm bells because it goes beyond typical polymorphic malware, which will only rewrite part of its computer code to evade detection. Instead, the uncovered malware goes even further by completely recompiling its code during each infection when it first connects to the internet.

This “metamorphic” ability prevents the malware from leaving a consistent signature behind, making it harder for antivirus programs to spot. According to Wired, one security researcher tested the malware almost 100 times and “every time it built itself in a different way and communicated differently.”

As a result, BIO-ISAC has dubbed the malware Tardigrade, the microorganism that can survive extremely hot and cold conditions, including the vacuum of outer space. But unlike a real Tardigrade, the malware can secretly hijack a computer system to steal and modify files.

Contains the sneaky ability to spread both via phishing emails and USB devices

The nonprofit first uncovered the malware this past spring when one of its member companies, Biobright, investigated a ransomware attack on a large, unnamed biomanufacturing facility. The security researchers obtained the ransomware along with the program that loaded the malicious coding, which turned out to be unusually complex.

BIO-ISAC has since uncovered the Tardigrade malware attacking a second facility. This prompted the group to issue Monday’s warning to the biotech industry, saying it believes Tardigrade is “actively spreading in the bioeconomy.”

In addition, it contains the sneaky ability to spread both via phishing emails and USB devices. Definitely a reason to step your users through new-school security awareness training and send them frequent social engineering tests.

The full article is at PCMag


Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/phishing-security-test-offer

Subscribe To Our Blog


Ransomware Hostage Rescue Manual




Get the latest about social engineering

Subscribe to CyberheistNews