{"id":14245,"date":"2019-01-04T11:10:03","date_gmt":"2019-01-04T19:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/04\/news-7997\/"},"modified":"2019-01-04T11:10:03","modified_gmt":"2019-01-04T19:10:03","slug":"news-7997","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/01\/04\/news-7997\/","title":{"rendered":"Vidar and GandCrab: stealer and ransomware combo observed in the wild"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 04 Jan 2019 18:15:25 +0000<\/strong><\/p>\n<p>We have been tracking a prolific malvertising campaign for several weeks and captured a variety of payloads, including several stealers. One that we initially identified as Arkei turned out to be Vidar, a new piece of malware recently analyzed in detail by <a href=\"https:\/\/twitter.com\/fumik0_\" target=\"_blank\" rel=\"noopener\">Fumik0_<\/a>\u00a0in his post:\u00a0<a href=\"https:\/\/fumik0.com\/2018\/12\/24\/lets-dig-into-vidar-an-arkei-copycat-forked-stealer-in-depth-analysis\/\" target=\"_blank\" rel=\"noopener\"><em>Let\u2019s dig into Vidar \u2013 An Arkei Copycat\/Forked Stealer (In-depth analysis)<\/em><\/a>.<\/p>\n<p>In\u00a0Norse Mythology,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/V%C3%AD%C3%B0arr\" target=\"_blank\" rel=\"noopener\"><strong><em>V\u00ed\u00f0arr<\/em><\/strong><\/a>\u00a0is a god and son of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Odin\" target=\"_blank\" rel=\"noopener\">Odin<\/a>, whose death it is foretold he will avenge. Being referred to as &#8220;The Silent One&#8221; seems to be fitting for this stealer that can loot\u00a0from browser histories (including Tor Browser) and cryptocurrency wallets, capture instant messages, and much more.<\/p>\n<p>We witnessed\u00a0a threat actor using the Fallout exploit kit to distribute Vidar. But victims won&#8217;t notice that as much, as the secondary and noisier payload being pushed is GandCrab ransomware.<\/p>\n<h3>Overview<\/h3>\n<p>A malvertising chain leads us to the Fallout exploit kit followed by what we thought was an Arkei stealer. Upon closer look, while the sample did share a lot of similarities with Arkei (including network events), it was actually a newer and, at the time, not yet publicly described piece of malware now identified as Vidar.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26719\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/attachment\/vidar_gandcrab\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab.png\" data-orig-size=\"870,419\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Vidar_GandCrab\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab-300x144.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab-600x289.png\" class=\"alignnone size-full wp-image-26719\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab.png\" alt=\"\" width=\"870\" height=\"419\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab.png 870w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab-300x144.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_GandCrab-600x289.png 600w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/a><\/p>\n<p>Beyond Vidar&#8217;s stealer capabilities, we also noticed a secondary payload that was retrieved from Vidar&#8217;s own command and control (C2) server. The infection timeline showed that victims were first infected with Vidar, which tried to extract confidential information, before eventually being compromised with the GandCrab ransomware.<\/p>\n<h3>Malvertising and Fallout exploit kit<\/h3>\n<p>Torrent and streaming video sites drive a lot of traffic, and their advertising is often aggressive and poorly-regulated. A malicious actor using a rogue advertising domain is redirecting these site visitors according to their geolocation and provenance to at least two different exploit kits (Fallout EK and GrandSoft EK), although the former is the most active.<\/p>\n<p>Stealers such as AZORult seem to be the a favorite payload here, but we also noticed that Arkei\/Vidar was quite common. In this particular instance, we saw Vidar being pushed via the Fallout exploit kit.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26751\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/attachment\/fiddler_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_.png\" data-orig-size=\"584,406\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Fiddler_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_-300x209.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_.png\" class=\"alignnone size-full wp-image-26751\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_.png\" alt=\"\" width=\"584\" height=\"406\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_.png 584w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Fiddler_-300x209.png 300w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/a><\/p>\n<h3>Vidar<\/h3>\n<p>It should be noted that Vidar is sold as a product, and as such can be\u00a0distributed by several different threat groups through different campaigns.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26722\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/attachment\/vidar_product\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product.png\" data-orig-size=\"2428,984\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Vidar_product\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product-300x122.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product-600x243.png\" class=\"alignnone size-full wp-image-26722\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product.png\" alt=\"\" width=\"2428\" height=\"984\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product.png 2428w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product-300x122.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/Vidar_product-600x243.png 600w\" sizes=\"auto, (max-width: 2428px) 100vw, 2428px\" \/><\/a><\/p>\n<p>Vidar customers can customize the stealer via profiles, which gives them a way to adjust which kind of data they are interested in. Beyond the usual credit card numbers and other passwords stored in applications, Vidar can also scrape an impressive selection of digital wallets.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26713\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/attachment\/vidar_profile\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile.png\" data-orig-size=\"639,288\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Vidar_profile\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile-300x135.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile-600x270.png\" class=\"alignnone size-full wp-image-26713\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile.png\" alt=\"\" width=\"639\" height=\"288\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile.png 639w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile-300x135.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_profile-600x270.png 600w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/a><\/p>\n<p>Upon execution on the system, Vidar will search for any data specified in its profile configuration and immediately send it back to the C2 server via an unencrypted HTTP POST request.<\/p>\n<p>This includes high level system details (specs, running processes, and installed applications) and stats about the victim (IP address, country, city, and ISP) stored in a file called\u00a0<em>information.txt<\/em>. This file is packaged along with other stolen data and zipped before being sent back to the C2 server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26710\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/attachment\/vidar_exfil\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil.png\" data-orig-size=\"736,679\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Vidar_exfil\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil-300x277.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil-600x554.png\" class=\"alignnone size-full wp-image-26710\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil.png\" alt=\"\" width=\"736\" height=\"679\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil.png 736w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil-300x277.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/Vidar_exfil-600x554.png 600w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/p>\n<h3>GandCrab as a loader<\/h3>\n<p>Vidar also offers to download additional malware via its command and control server. This is known as the loader feature, and again, it can be configured within Vidar&#8217;s administration panel by adding a direct URL to the payload. However, not all instances of Vidar (tied to a profile ID) will download an additional payload. In that case, the server will send back a response of &#8220;ok&#8221; instead of a URL.<\/p>\n<pre>HTTP\/1.1 200 OK  Date:   Content-Type: text\/html; charset=UTF-8  Connection: keep-alive  Server: Pro-Managed  Content-Length: 51    http:\/\/ovz1.fl1nt1kk.10301.vps.myjino[.]ru\/topup.exe;<\/pre>\n<p>Within about a minute after the initial Vidar infection, the victim&#8217;s files will be encrypted and their wallpaper hijacked to display the note for GandCrab version 5.04.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26755\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/attachment\/ransom_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_.png\" data-orig-size=\"692,234\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ransom_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_-300x101.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_-600x203.png\" class=\"alignnone size-full wp-image-26755\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_.png\" alt=\"\" width=\"692\" height=\"234\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_.png 692w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_-300x101.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/ransom_-600x203.png 600w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<h3>Ransomware as a last payload<\/h3>\n<p>While ransomware experienced a slowdown in 2018, it is still one of the more dangerous threats. In contrast to many other types of malware, ransomware is instantly visible and requires a call to action, whether victims decide to pay the ransom or not.<\/p>\n<p>However, threat actors can use ransomware for a variety of reasons within their playbook. It could be, for instance, a simple decoy where the real goal is to irreversibly corrupt systems without any way to recover lost data. But as we see here, it can be coupled with other threats and used as a last payload when other resources have already been exhausted.<\/p>\n<p>As a result, victims get a double whammy. Not only are they robbed of their financial and personal information, but they are also being extorted to recover the now encrypted data.<\/p>\n<p>Malwarebytes users are protected against this threat at multiple levels. Our signatureless anti-exploit engine mitigates the Internet Explorer and Flash Player exploits delivered by the Fallout exploit kit. We detect the dropped stealer as Spyware.Vidar and also thwart GandCrab via our anti-ransomware module.<\/p>\n<h3>Acknowledgements<\/h3>\n<p><em>Many thanks to\u00a0<a href=\"https:\/\/twitter.com\/fumik0_\" target=\"_blank\" rel=\"noopener\">Fumik0_<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/siri_urz\" target=\"_blank\" rel=\"noopener\">@siri_urz<\/a> for their inputs and Vidar payload identification.<\/em><\/p>\n<h3>Indicators of Compromise (IOCs)<\/h3>\n<p>Vidar binary<\/p>\n<pre>E99DAF10E6CB98E93F82DBE344E6D6B483B9073E80B128C163034F68DE63BE33<\/pre>\n<p>Vidar C2<\/p>\n<pre>kolobkoproms[.]ug<\/pre>\n<p>Loader URL (GandCrab)<\/p>\n<pre>ovz1.fl1nt1kk.10301.vps.myjino[.]ru\/topup.exe<\/pre>\n<p>GandCrab binary<\/p>\n<pre>ABF3FDB17799F468E850D823F845647738B6674451383156473F1742FFBD61EC<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/\">Vidar and GandCrab: stealer and ransomware combo observed in the wild<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Fri, 04 Jan 2019 18:15:25 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/' title='Vidar and GandCrab: stealer and ransomware combo observed in the wild'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/shutterstock_1239041536.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Threat actors combine new stealer Vidar and GandCrab ransomware in one-two punch.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/criminals\/\" rel=\"category tag\">Criminals<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/arkei\/\" rel=\"tag\">Arkei<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fallout\/\" rel=\"tag\">Fallout<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gandcrab\/\" rel=\"tag\">gandcrab<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vidar\/\" rel=\"tag\">Vidar<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/' title='Vidar and GandCrab: stealer and ransomware combo observed in the wild'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/\">Vidar and GandCrab: stealer and ransomware combo observed in the wild<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20583,3108,11638,10534,19945,17363,3765,10494,20584],"class_list":["post-14245","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-arkei","tag-criminals","tag-exploit","tag-exploit-kit","tag-fallout","tag-gandcrab","tag-ransomware","tag-threat-analysis","tag-vidar"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14245"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14245\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14245"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}