The Eldorado ransomware-as-a-service (RaaS) operation, first detected in March 2024 by Singaporean security firm Group-IB, has infected at least 16 organisations, with a significant impact in the US. Eldorado offers an affiliate program and malware versions for both Linux and Windows systems, leveraging the Go programming language for cross-platform capabilities. The ransomware uses the Chacha20 algorithm for file encryption and RSA-OAEP for key encryption, and it employs the SMB protocol for network file encryption. Affiliates can customise ransomware samples by specifying the target network, ransom note details, and domain administrator credentials. Eldorado's malware is distinct in that it does not use previously leaked builder sources and includes advanced techniques such as using PowerShell commands to delete traces of the malware. As of June 2024, Eldorado has affected multiple industries, with the majority of attacks occurring in the US.
Key Points:
Source and further reading.
Lyons, J. (2024, July 9). Eldorado ransomware-as-a-service gang targets Linux, Windows systems.
theregister.com.
https://www.theregister.com/2024/07/09/eldorado_ransomware_linux_windows/
The Hacker News. (n.d.).
New Ransomware-as-a-Service “Eldorado” targets Windows and Linux systems.
https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html