New: Threat Exposure Validation Impact Report 2025
Learn More
Join our Summer Webinar Series on Threat Exposure Validation
Register Now

Ransomware Targeting Albania Using Stolen Certificates To Sign Malware

December 29, 2022

The threat actors targeting Albanian organizations with ransomware and wiper malware have updated portions of their malware delivery operations.
In both the first and second wave of attacks the ransomware uses a code signing certificate, which was most likely stolen from a Kuwait Telecommunications Company.
In early deployments, the wiper malware and raw disk driver made use of a signed third-party loader, a signed loader for unsigned drivers, to deploy the raw disk driver and obtain access the raw disk on the machine.
However, in the second wave, the threat actors made use of a leaked Nvidia code signing certificate to sign the wiper malware which now has the modified raw disk driver embedded into the signed payload.