{"id":3022,"date":"2024-09-25T20:58:07","date_gmt":"2024-09-25T20:58:07","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=3022"},"modified":"2025-07-29T06:57:28","modified_gmt":"2025-07-29T06:57:28","slug":"hiddentear-proliferates-is-this-part-of-a-open-source-trend-that-will-make-the-whole-world-cry","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/hiddentear-proliferates-is-this-part-of-a-open-source-trend-that-will-make-the-whole-world-cry\/","title":{"rendered":"HiddenTear Proliferates. Is this part of a Open-Source trend that will make the whole world cry?"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"281\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/post.webp\" alt=\"\" class=\"wp-image-3031\"\/><\/figure>\n<\/div>\n\n\n<p>Recently LMNTRIX threat intelligence has observed a sudden spike in open-source ransomware across the Dark Web, and HiddenTear is topping the list. &nbsp;The initial propagation of HiddenTear was from a Github project started by <a href=\"https:\/\/github.com\/utkusen\/hidden-tear\" target=\"_blank\" rel=\"noopener\">UtkuSen<\/a>, with a disclaimer that the code was published for educational purposes.<br><br>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"586\" height=\"278\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-56.webp\" alt=\"\" class=\"wp-image-3025\"\/><\/figure>\n\n\n\n<p><br><br>Korean threat actors are believed to have taken over the HiddenTear project and have developed multiple variants of the ransomware in different programming languages. These variants now appear to be being traded openly on the Dark Web, raising the spectre of impending harm to a range of industries as the volume of harder-to-detect ransomware increases.&nbsp;<br><br>Our team has observed multiple such variants in the Dark Web. Below is a list of of HiddenTear ransomware variants that are available as of today:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"863\" height=\"469\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-54.webp\" alt=\"\" class=\"wp-image-3026\"\/><\/figure>\n\n\n\n<p> &nbsp;<br><br>The Dark Web appears to be fascinated with open-source ransomware, with selling boards everywhere calling it an <strong>\u201c[OpenSource] Ransomware Recopilation\u201d<\/strong><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"683\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-53.webp\" alt=\"\" class=\"wp-image-3027\"\/><\/figure>\n\n\n\n<p><br><br>There are various types of open-source ransomware being sold in the dark markets, complete with download links and passwords. Some of the variants include the following:<br><br><strong><em>&nbsp;Andr0id L0cker &#8211; Panel + Source Java&nbsp;<br><br>BasicLocker &#8211; Source &nbsp; C#&nbsp;<br><br>CryptoLocker &#8211; Source &nbsp; C#&nbsp;<br><br>CryptoWire &#8211; Source &nbsp; AutoIT&nbsp;<br><br>GO Ransomware &#8211; SourCe &nbsp; GO&nbsp;<br><br>HiddenTear &#8211; Source &nbsp; C#&nbsp;<br><br>M.D.Groot Ransomware &#8211; Source &nbsp;C#&nbsp;<br><br>MyLittleRansomware &#8211; Source &nbsp;C#&nbsp;<br><br>NxRansomware &#8211; Source + Panel &nbsp;C#&nbsp;<br><br>Shell Screen Locker &#8211; Source &nbsp;VB&nbsp;<br><br>YourRansom &#8211; Source &nbsp; GO<\/em><\/strong><br><br>Here are a few screenshots showing some of them:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1517\" height=\"819\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-54.webp\" alt=\"\" class=\"wp-image-3028\"\/><\/figure>\n\n\n\n<p>&nbsp;<br><br>In order to validate the authenticity of some of these download links we tried to download the \u201cGo Ransomware\u201d sample &#8211; and &#8211;Bingo!&#8211; the download link proved active.<br><br><strong>Code Analysis:<\/strong><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1010\" height=\"897\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-51.webp\" alt=\"\" class=\"wp-image-3029\"\/><\/figure>\n\n\n\n<p>&nbsp;<br><br>The \u201cMain.go\u201d module consists of an \u201cIf \u201c function (as shown in the highlighted section above) , and all files matching the condition are encrypted with the extension \u201c.youransom\u201d.&nbsp;<br><br>In the Filter function (below) we can see the suffix list, which are the file types for which the Ransomware performs the encryption.&nbsp;<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"474\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-48.webp\" alt=\"\" class=\"wp-image-3030\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-48.webp 1600w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-48-1536x455.webp 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n\n\n\n<p><br><br>The combination of open-source and the darknet is a significant one because it encourages the ready morphing of a possible limitless number of variants that will thwart detection. &nbsp;We will continue to monitor this trend.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently LMNTRIX threat intelligence has observed a sudden spike in open-source ransomware across the Dark Web, and HiddenTear is topping the list. &nbsp;The initial propagation of HiddenTear was from a Github project started by UtkuSen, with a disclaimer that the code was published for educational purposes. &nbsp; Korean threat actors are believed to have taken [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-3022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=3022"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3022\/revisions"}],"predecessor-version":[{"id":4353,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3022\/revisions\/4353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/3031"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=3022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=3022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=3022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}