Cyber Security News

Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums

Monolock ransomware has surfaced in underground forums, with threat actors advertising version 1.0 for sale alongside stolen corporate credentials.

First detected in late September, the malware exploits phishing emails containing malicious Word documents.

Upon opening, the embedded macro downloads the ransomware binary from a compromised server. Victims report file encryption using a mix of AES-256 for file payloads and RSA-2048 for key exchange, rendering data inaccessible without the private key.

Dark Web Informer analysts noted that Monolock’s initial deployments targeted small to mid-sized organizations in healthcare and manufacturing sectors.

The operators demand payment in cryptocurrency, instructing victims to access a Tor-hosted payment portal. This portal automatically verifies the transaction and supplies the decryption key.

Early samples reveal a ransom note that offers a 10 percent discount if paid within 48 hours.

In controlled environments, researchers identified that Monolock terminates processes associated with common backup and security software before encryption begins.

It scans running services for patterns matching “backup,” “sql,” and “vss,” then kills them to prevent snapshot restores.

After encryption, it appends the extension “.monolock” to filenames and leaves a ransom note named “README_RECOVER.txt” in each directory.

Persistence and Evasion

Monolock’s infection mechanism embeds itself into the Windows registry under the Run key, ensuring execution at boot.

The malware binary disguises as a legitimate DLL and injects into explorer.exe to evade detection.

It uses API hashing to locate required Windows functions dynamically, complicating static signature matching.

A snippet of the API-hashing routine demonstrates this tactic:-

DWORD hash = 0xA1B2C3D4;
for (char* p = moduleName; *p; ++p) {
    hash = ((hash << 7) | (hash >> (32 - 7))) ^ *p;
}

By leveraging this routine, Monolock avoids importing functions by name, hindering many endpoint detection tools.

This advanced evasion underscores the need for behavior-based monitoring to detect such threats.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

18 minutes ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

2 hours ago

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as…

2 hours ago

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that…

3 hours ago

MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations

The Advanced Persistent Threat group MuddyWater, widely recognized as an Iran-linked espionage actor, has orchestrated…

5 hours ago

New Red Teaming Tool RedTiger Attacking Gamers and Discord Accounts in the Wild

RedTiger is an open-source red-teaming tool repurposed by attackers to steal sensitive data from Discord…

5 hours ago