New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands - Cyber Security News

A new ransomware strain dubbed “Mamona” that operates entirely offline and leverages a clever attack strategy that abuses the Windows ping command. Encrypted files receive the “.HAes” extension (e.g., “document.pdf” becomes “document.pdf.HAes”), and a ransom note titled “README.HAes.txt” is dropped in multiple directories. What makes Mamona unique is its “mute” operation – it performs all activities locally, with no observed Command and Control channels or data exfiltration. The ransomware changes the desktop wallpaper to display “Your files have been encrypted!”. Unlike traditional ransomware that communicates with remote servers, Mamona works completely offline, making it particularly difficult to detect with conventional network monitoring tools. It’s easy to deploy, harder to detect with traditional tools, and still effective enough to encrypt systems and pressure victims into paying,” Mauro Eldritch noted. “There’s literally no network activity, so this seems to be a threat to coerce the victim into paying the ransom,” security experts concluded. “This strain highlights a rising trend: ransomware that trades complexity for accessibility. The emergence of Mamona reinforces a concerning trend in the ransomware landscape – the shift toward easily accessible, builder-based ransomware that prioritizes simplicity over sophistication, lowering the barrier to entry for less technical cybercriminals. Files are encrypted using a homemade cryptographic routine rather than standard libraries, with all encryption logic implemented through low-level memory manipulation and arithmetic operations. “Despite the decrypter featuring an outdated interface, it effectively restores encrypted files,” researchers confirmed. Files are encrypted using a custom, homemade encryption routine rather than standard cryptographic libraries, and are renamed with the .HAes extension. Mamona has been linked to campaigns previously run by BlackLock ransomware affiliates, who are also connected to another strain called Embargo. It’s easy to deploy, harder to detect with traditional tools, and still effective enough to encrypt systems and pressure victims into paying. Once the short delay is complete, the second part of the command attempts to delete the executable from disk using Del /f /q,” explained researcher Mauro Eldritch. Despite threatening to leak stolen data in its ransom note, analysis confirms Mamona performs no actual data exfiltration. While Mamona uses relatively weak encryption methods, its offline operation and ease-of-use for low-skill cybercriminals pose significant risks to both individuals and organizations. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This strain highlights a rising trend: ransomware that trades complexity for accessibility. The ransomware particularly threatens small and medium-sized businesses without sophisticated security monitoring. The ransomware gained additional notoriety when the DragonForce group reportedly took over operations after BlackLock was dismantled in March 2025.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 09 May 2025 16:10:21 +0000


Cyber News related to New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands - Cyber Security News

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands - Cyber Security News - A new ransomware strain dubbed “Mamona” that operates entirely offline and leverages a clever attack strategy that abuses the Windows ping command. Encrypted files receive the “.HAes” extension (e.g., ...
6 months ago Cybersecuritynews.com Dragonforce
10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
8 months ago Cybersecuritynews.com
10 Best Ransomware File Decryptor Tools in 2025 - Kaspersky Rakhni Decryptor contains different decryption tools based on various versions of Rakhni ransomware and helps you decrypt encrypted files on your system. PyLocky Ransomware Decryption Tool is a free and open source developed and released by ...
7 months ago Cybersecuritynews.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
4 months ago Cybersecuritynews.com
GLOBAL GROUP's Golang Ransomware Attacks Windows, Linux, and macOS Environments - However, forensic analysis conducted by Picus Security Labs researchers revealed that GLOBAL GROUP is not an entirely new threat family but rather a sophisticated rebranding of existing ransomware operations. Through detailed examination of malware ...
3 months ago Cybersecuritynews.com LockBit
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
6 months ago Cybersecuritynews.com
Prince Ransomware - An Open Source Ransomware Builder That Automatically Build Ransomware Freely Available in GitHub - Cyber Security News - WithSecure Labs security analysts noted multiple instances of Prince Ransomware-based attacks, including a prominent case in February 2025, when Taiwan’s Mackay Memorial Hospital fell victim to “CrazyHunter” ransomware. This ...
7 months ago Cybersecuritynews.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
The Top 10 Ransomware Groups of 2023 - This article takes an in-depth look at the rise in ransomware attacks over the past year and the criminal groups driving the surge in cyber extortion. LockBit has established itself as one of the most notorious ransomware operations since emerging on ...
1 year ago Securityboulevard.com TA505 8base LockBit BianLian Medusa Noescape Black Basta
Hive Ransomware: A Detailed Analysis - This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments and remediation costs. As ransomware continues to be a national security threat ...
2 years ago Heimdalsecurity.com LockBit
BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery - A newly emerged ransomware group known as BERT has introduced a particularly disruptive capability that sets it apart from traditional ransomware operations: the ability to forcibly terminate ESXi virtual machines before encryption, significantly ...
4 months ago Cybersecuritynews.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
Waiting for the BlackCat rebrand - We saw another ransomware operation shut down this week after first getting breached by law enforcement and then targeting critical infrastructure, putting them further in the spotlight of the US government. While the Tor onion domain seizure was a ...
1 year ago Bleepingcomputer.com Medusa Cuba STORMOUS
The Week in Ransomware - Governments struck back this week against members of ransomware operations, imposing sanctions on one threat actor and sentencing another to prison. On Tuesday, the Australian, US, and UK governments announced sanctions against Aleksandr Gennadievich ...
1 year ago Bleepingcomputer.com LockBit BianLian Akira Cactus
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
Medusa Ransomware Turning Your Files into Stone - Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. The Unit 42 ...
1 year ago Unit42.paloaltonetworks.com Medusa
RansomHub Ransomware Group Compromised 84 Organization, New Groups Emerging - Cyfirma researchers noted a custom backdoor called “Betruger” being deployed in recent RansomHub operations, representing a significant evolution in ransomware tactics. Unlike some ransomware operations that rely heavily on publicly ...
6 months ago Cybersecuritynews.com Ransomhub
Vgod RANSOMWARE Encrypt Your Entire System and Set A Ransom Notes As Wallpaper - Vgod ransomware uses a hybrid cryptographic approach, leveraging AES-256 for file encryption and RSA-4096 for key protection, a methodology consistent with advanced ransomware families like Ryuk and LockBit. The ransomware employs multiple ...
8 months ago Cybersecuritynews.com LockBit
The Week in Ransomware - An international law enforcement operation claims to have dismantled a ransomware affiliate operation in Ukraine, which was responsible for attacks on organizations in 71 countries. The threat actors are said to be affiliates of numerous ransomware ...
1 year ago Bleepingcomputer.com Qilin Cactus Black Basta
Ransomware Roundup - The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the 8base ransomware. 8base ...
1 year ago Feeds.fortinet.com 8base
Ransomware trends and recovery strategies companies should know - Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in ...
1 year ago Helpnetsecurity.com
The Week in Ransomware - Earlier this month, the BlackCat/ALPHV ransomware operation suffered a five-day disruption to their Tor data leak and negotiation sites, rumored to be caused by a law enforcement action. The FBI revealed this week that they hacked the BlackCat/ALPHV ...
1 year ago Bleepingcomputer.com LockBit Akira Noescape
New York's cyber chief on keeping cities and states safe from cyberattacks | The Record from Recorded Future News - And so we think that that'll continue to evolve the security posture of New York State in a way that first and foremost provides the public good, which is, if a government service is not secure, it can't be considered reliable. We're ...
7 months ago Therecord.media
RansomHub’s EDRKillShifter Link With Other Well-Established Ransomware Gang’s - New Research - In May 2024, RansomHub introduced EDRKillShifter, a custom endpoint detection and response killer designed to terminate security products by abusing vulnerable drivers, effectively blinding defensive systems before encryption begins. ESET researchers ...
7 months ago Cybersecuritynews.com BianLian Medusa Ransomhub LockBit
New KAWA4096’s Ransomware Leverages Windows Management Instrumentation to Delete Shadow Copies - A sophisticated new ransomware strain named KAWA4096 has emerged in the cybersecurity landscape, showcasing advanced evasion techniques and borrowing design elements from established threat actors. Trustwave analysts identified this emerging threat ...
3 months ago Cybersecuritynews.com Akira Qilin

Cyber Trends (last 7 days)