DECAF Ransomware: A New Golang Threat Makes Its Appearance

Key Points The Go language is becoming increasingly popular among threat actors, with attacks starting to appear in 2019 Morphisec Labs has tracked a new Golang-based (1.17) ransomware variant that appeared starting in late September and continued development through October  Morphisec recommends organizations update their breach prevention strategies to include the risk of Golang-based ransomware  Introduction

Ransomware written in the Go language is quickly becoming more popular among threat actors. These include Babuk, Hive, and HelloKitty, as well as many other threats written in Golang. “Go” is a statically typed, object-oriented, cross-platform programming language introduced by Google. The abstraction and the support for multiple platforms is an advantage for many developers and also a disadvantage for security vendors who attempt to create signatures for malicious executable malware, which comes with all the dependent libraries built-in.

Morphisec Labs has identified a new strain of ransomware, implemented in Go 1.17 and named DECAF. The first version, which includes symbols and test assertion, was identified in late September. The attackers very quickly stripped the original alpha version, added additional functionality, and uploaded this stub version to verify its detection score. Within a week they had deployed a fully weaponized version on

Read More: https://blog.morphisec.com/decaf-ransomware-a-new-golang-threat-makes-its-appearance