New SynAck Ransomware Variant Uses Doppelganging Process

Written byHeloise Montini
Heloise Montini

Heloise Montini is a content writer whose background in journalism make her an asset when researching and writing tech content. Also, her personal aspirations in creative writing and PC gaming make her articles on data storage and data recovery accessible for a wide audience.

Edited byLaura Pompeu
Laura Pompeu

With 10 years of experience in journalism, SEO & digital marketing, Laura Pompeu uses her skills and experience to manage (and sometimes write) content focused on technology and business strategies.

Co-written byBogdan Glushko
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

I think there's an issue with my storage device, but I'm not sure
Start a free evaluation

Some malware variants are becoming smarter and harder to stop. Kaspersky Lab discovered a new version of the SynAttack, which uses Process Doppelganging to evade malware tools, according to a report by Dark Reading.

How Does SynAck Ransomware Work?

Lead malware analyst for Kaspersky Lab, Anton Ivanov told Dark Reading, “Enterprises should be aware that threat actions have switched to targeted attacks with ransomware. These actors are beginning to use custom made ransomware with complicated techniques to bypass security solutions.”If Ivanov’s comments were not sobering enough, consider this: Dark Reading found that authors of the SynAttack ransomware are using a potent combination of manual downloads for malware installation on devices and remote protocol brute-force attacks. What makes this attack even more sinister is the deployment of the Doppelganging Process.

What is a Doppelganging Process?

Simply, ransomware authors devise malicious code and when your device reads them, they come across as harmless files. This is beneficial to hackers because it allows them to bypass the protocols found in anti-malware software.Researchers from Kaspersky Lab went into further detail, “By manipulating how Windows handle file transactions, attackers can pass off malicious actions as harmless, legitimate processes, even if they are using known malicious code.”

Other Characteristics of the SynAck Ransomware Variant

Along with bypassing security protocols, the variant can also delete traces that it was even on the device. This makes it difficult for security personnel to re-engineer the code because they don’t have access to it.In addition, the ransomware is capable of killing database applications, virtual machines, backup systems, and more, making it a tough customer for security experts to wrestle with.[caption id="attachment_23048" align="alignnone" width="960"]

Photo by: ID Experts[/caption]

How Do I Know if I’m Affected?

Similar to other ransomware, you’ll receive a demand to pay with the vague promise of the author releasing the data back to you. According to Dark Reading, the average ransom is $3,000, so the hackers are banking on more people paying up given the low demand.

What Happens if I Have Ransomware?

Ransomware is no joke as it prohibits access to your files. And if you run a business, this can be crippling to your operations. Thankfully, there’s a quick process to recover your data.SalvageData built a reputation on quality, expertise, and compliance. With over 40 locations nationwide, we could be closer than you think. Contact us today to take the first step towards recovering your data, you’ll be glad you did.

Share this article

Related services

These are the most commonly requested data recovery services. At our headquarters' cleanroom lab, our certified engineers conduct a thorough review of any type of physical storage device, determining if there is logical or physical damage and carefully restoring all of the lost files.ces.

External Drive Data Recovery

We recover data from both external SSD and HDD drives. Rely on certified experts to restore your important files from damaged or corrupted external drives.

/services/data-recovery/external-drive/

Hard Drive Data Recovery

Recover data from all brands of HDD, PC hard drives, and hybrid disks. Our specialists ensure fast and secure recovery for any data loss scenario.

/services/data-recovery/hard-drive/

NAS Data Recovery

Recover data from NAS devices, including RAID configurations. Our team handles all types of NAS systems and ensures data recovery with minimal downtime.

/services/data-recovery/nas/

RAID Data Recovery

Our RAID data recovery services cover RAID 0, 1, 5, 10, and other configurations. We offer expert solutions for failed, degraded, or corrupted RAID arrays.

/services/data-recovery/raid/

SAN Data Recovery

Our team specializes in handling SAN devices from leading manufacturers like Dell EMC, HP, and IBM, ensuring efficient recovery with minimal disruption to your operations.

/services/data-recovery/san/

SD Card Data Recovery

Our recovery experts specialize in restoring data from SD and memory cards. We guarantee quick recovery with a no-data, no-charge policy.

/services/data-recovery/sd-card/

SSD Data Recovery

Our data recovery experts handle all SSD data loss scenarios with advanced tools, ensuring maximum recovery with high-security protocols.

/services/data-recovery/ssd/

USB Flash Drive Data Recovery

Recover lost data from USB flash drives, regardless of the damage or brand. We offer free in-lab evaluations to assess data recovery needs.

/services/data-recovery/usb-flash-drive/

If you’re unsure about which data recovery service to choose, let our team assist you in selecting the appropriate solutions. We understand the anxiety that comes with a sudden drive failure, and we are more prompt in our actions compared to other recovery service providers.