{"id":400951,"date":"2020-12-16T09:03:37","date_gmt":"2020-12-16T14:03:37","guid":{"rendered":"http:\/\/www.marketnewsdesk.com\/?p=400951"},"modified":"2020-12-16T09:03:37","modified_gmt":"2020-12-16T14:03:37","slug":"sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/","title":{"rendered":"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators"},"content":{"rendered":"<h2>\nUpgraded Tool Used In Ryuk And Egregor Attacks<br \/>\n<\/h2>\n<div class=\"mw_release\">\n<p align=\"left\">OXFORD, United Kingdom, Dec.  16, 2020  (GLOBE NEWSWIRE) &#8212; <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=A3twmTFbiaB7v5vzq1qO-sGkllCiOckx69RSBnFAhAMGKs9RxyiIWfPUYb4Eau5uHCw5FJb_P-pgCiOyMa-FSg==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Sophos<\/a>, a global leader in next-generation cybersecurity, today published new research into the SystemBC malware, \u201c<a href=\"https:\/\/www.globenewswire.com\/Tracker?data=_prkWHLRI2ijTnvHqnQTNMv_Pgyin9J2SPWdWph69_1k1J8-bx86kkkg2TfMB76GwI4N48HpEDoV5XAczWljy73Bj6noh4a2Y0bQkJNyKVqD8o3GTTbz7Ek3nXcQx1bTyWw5KCGxiEv_lSsgPc4z6gZG7TBXxRSqG0Dyc43Mw11_x5Jo4eahlyKkH2sHJzmJ\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor<\/a>.\u201d The research shows how SystemBC has developed into a fully-fledged remote access tool that acts as a Tor proxy and is being used in ransomware-as-a-service attacks for communications, data exfiltration and the download and execution of malicious modules.<\/p>\n<p>SystemBC was first discovered in 2019, operating like a \u201cvirtual private network\u201d via a SOCKS5 proxy. A year on, the upgraded version analysed by Sophos provides attackers with a persistent backdoor that automates a number of key activities so that operators can launch multiple attacks without the need for hands-on-keyboard activity. It can execute Windows commands passed over the Tor connection, as well as deliver and execute scripts, malicious executables and dynamic link libraries (DLLs).<\/p>\n<p>Sophos\u2019 research is based on investigations into recent ransomware-as-a-service attacks involving Ryuk and Egregor, which all deployed SystemBC. The investigations show that SystemBC is used in combination with different commodity tools, creating a diverse profile of tactics, techniques and procedures (TTPs). For instance, in some of the Ryuk attacks investigated SystemBC was deployed alongside Buer Loader malware, while other attacks in the same campaign used Bazar or Zloader. The Egregor attacks that Sophos investigated used SystemBC together with Qbot.<\/p>\n<p>\u201cWe are increasingly seeing ransomware operators outsource the deployment of ransomware to affiliates using commodity malware and attack tools,\u201d said Sean Gallagher, senior security researchers, Sophos. \u201cSystemBC is a regular part of recent ransomware attackers\u2019 toolkits\u2014 Sophos has detected hundreds of attempted SystemBC deployments worldwide over the last few months. The backdoor can be used in combination with other scripts and malware to perform discovery, exfiltration and lateral movement in an automated way across multiple targets. These SystemBC capabilities were originally intended for widespread commodity malware, but they have now been folded into the toolkit for targeted attacks\u2014including ransomware.<\/p>\n<p>\u201cThe use of multiple tools in ransomware-as-a-service attacks creates an ever more diverse attack profile that is harder for IT security teams to predict and deal with. Defense-in-depth, employee education and human-based threat hunting are essential to detecting and blocking such attacks.\u201d<\/p>\n<p>A list of IOCs for SystemBC is posted on SophosLabs\u2019 GitHub page.<\/p>\n<p>Further information on System BC and other cyberthreats can be found on <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=A3twmTFbiaB7v5vzq1qO-sJcbtS9sFQIwHFhhNjHR0MCz8hmTE2O6GJbyS2uZrYBF4lbK_79tQnym_DAPgWiy_4-E8vppiVCYFf3zHWFT9JrylLhAoG-krUKm4m0NWj4\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">SophosLabs Uncut<\/a> where\u00a0Sophos researchers regularly publish their latest research and breakthrough findings, such as <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=cVHXf-D8LEfIZvW8VdMc1skpv4v4TRBXRmd1dw_m1DkwsSoAR9615hURhy6twiaWnadRwlv_1ybll9aPQV07Z26w5HHXAN2Gka3wm1W_ZvoqUsJfVM7wzDrkFeRTX7poyB2xxOjXoo9zFdBduRKDzNpdNTz8JuZGl1keVxYMKBWs1J3jydaYd14upQIocjYc\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Egregor Ransomware: Maze\u2019s Heir Apparant<\/a> and <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=d6BcFYM_dqkj3xMnFWSdMhXGRS0anbBiezkiLrooVTiuvyyqeJdeKVRstWMlaS2z1XW3zON-C0AlU4NIVAPXgP0ZGQzCKyf9J_JKDtTHNFEWRG2ilK2XwsjS7CyH6SgaCQexUQ8JSws6Hux4eOhKm1nN6RlhNYYgfh_JwGfGCMfHRkeMS7eA_Ft8rjTurTsb\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Inside a New Ryuk Ransomware Attack<\/a>. Threat researchers can follow SophosLabs Uncut in real time on Twitter at <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=GTPvyhQfu6ff5x0ewiaC5fBwt8QvAZKVw05drtPHA1Uwa00cr3n_6dVunwsZXIR7hca25T9LkZSQARmuzbVK5w==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@SophosLabs<\/a>.<\/p>\n<p>\n        <strong>Additional Resources<\/strong>\n      <\/p>\n<ul type=\"disc\">\n<li>The Sophos 2021 Threat Report is available at\u00a0<a href=\"http:\/\/www.sophos.com\/threatreport\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">www.sophos.com\/threatreport<\/a>.<\/li>\n<li>How Sophos Rapid Response and Sophos Managed Threat Response\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/09\/22\/mtr-casebook-blocking-a-15-million-maze-ransomware-attack\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">blocked a $15M ransomware attack<\/a><\/li>\n<li>See how Sophos Rapid Response dissected a\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/10\/14\/inside-a-new-ryuk-ransomware-attack\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">new wave of Ryuk attacks<\/a><\/li>\n<li>To help stop ransomware attacks, read the\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">five early indicators an attacker is present<\/a><\/li>\n<li>Learn more about\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2020\/10\/sophos-launches-rapid-response-service-to-identify-and-neutralize-active-cybersecurity-attacks.aspx\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Sophos\u2019 new Rapid Response service<\/a>\u00a0that disrupts attacks in real-time<\/li>\n<li>Learn how ransomware affects IT teams in Sophos\u2019 global survey,\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/content\/cybersecurity-the-human-challenge.aspx\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Cybersecurity: The Human Challenge<\/a><\/li>\n<\/ul>\n<p>\n        <strong>About Sophos<\/strong><br \/>\n        <br \/>As a worldwide leader in next-generation cybersecurity, Sophos protects more than 400,000 organizations of all sizes in more than 150 countries from today\u2019s most advanced cyber threats. Powered by SophosLabs \u2013 a global threat intelligence and data science team \u2013 Sophos\u2019 cloud-native and AI-powered solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cyberattack techniques, including ransomware, malware, exploits, data exfiltration, active-adversary breaches, phishing, and more. Sophos Central, a cloud-native management platform, integrates Sophos\u2019 entire portfolio of next-generation products, including the Intercept X endpoint solution and the XG next-generation firewall, into a single \u201csynchronized security\u201d system accessible through a set of APIs. Sophos has been driving a transition to next-generation cybersecurity, leveraging advanced capabilities in cloud, machine learning, APIs, automation, managed threat response, and more, to deliver enterprise-grade protection to any size organization. Sophos sells its products and services exclusively through a global channel of more than 53,000 partners and managed service providers (MSPs). Sophos also makes its innovative commercial technologies available to consumers via Sophos Home. The company is headquartered in Oxford, U.K. More information is available at <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=S2cuL6Fu_D4Wf0LQQHZqWHdUdioE74YtaZo8r0fLaHuTyDHttRC-tuDTiR0Xp1P1INVvnAHzLSUKcobJqR4I2w==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">www.sophos.com<\/a>.<\/p>\n<p>      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=\" width=\"1\" height=\"1\" \/><br \/>\n      <br \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/ml.globenewswire.com\/release\/track\/c442badf-bb08-4c8c-83fa-60e21c5fa3d7\" width=\"1\" height=\"1\" \/>\n    <\/div>\n<div class=\"mw_contactinfo\">\n<pre>Hanah Johnson, sophos@marchcomms.com<\/pre>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Upgraded Tool Used In Ryuk And Egregor Attacks OXFORD, United Kingdom, Dec. 16, 2020 (GLOBE NEWSWIRE) &#8212; Sophos, a global leader in next-generation cybersecurity, today published new research into the SystemBC malware, \u201cRansomware operators use SystemBC RAT as off-the-shelf Tor backdoor.\u201d The research shows how SystemBC has developed into a fully-fledged remote access tool that acts as a Tor proxy and is being used in ransomware-as-a-service attacks for communications, data exfiltration and the download and execution of malicious modules. SystemBC was first discovered in 2019, operating like a \u201cvirtual private network\u201d via a SOCKS5 proxy. A year on, the upgraded version analysed by Sophos provides attackers with a persistent backdoor that automates a number of key activities so that operators &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-400951","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Upgraded Tool Used In Ryuk And Egregor Attacks OXFORD, United Kingdom, Dec. 16, 2020 (GLOBE NEWSWIRE) &#8212; Sophos, a global leader in next-generation cybersecurity, today published new research into the SystemBC malware, \u201cRansomware operators use SystemBC RAT as off-the-shelf Tor backdoor.\u201d The research shows how SystemBC has developed into a fully-fledged remote access tool that acts as a Tor proxy and is being used in ransomware-as-a-service attacks for communications, data exfiltration and the download and execution of malicious modules. SystemBC was first discovered in 2019, operating like a \u201cvirtual private network\u201d via a SOCKS5 proxy. A year on, the upgraded version analysed by Sophos provides attackers with a persistent backdoor that automates a number of key activities so that operators &hellip; Continue reading &quot;Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-16T14:03:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators\",\"datePublished\":\"2020-12-16T14:03:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/\"},\"wordCount\":717,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/\",\"name\":\"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=\",\"datePublished\":\"2020-12-16T14:03:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=\",\"contentUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/","og_locale":"en_US","og_type":"article","og_title":"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators - Market Newsdesk","og_description":"Upgraded Tool Used In Ryuk And Egregor Attacks OXFORD, United Kingdom, Dec. 16, 2020 (GLOBE NEWSWIRE) &#8212; Sophos, a global leader in next-generation cybersecurity, today published new research into the SystemBC malware, \u201cRansomware operators use SystemBC RAT as off-the-shelf Tor backdoor.\u201d The research shows how SystemBC has developed into a fully-fledged remote access tool that acts as a Tor proxy and is being used in ransomware-as-a-service attacks for communications, data exfiltration and the download and execution of malicious modules. SystemBC was first discovered in 2019, operating like a \u201cvirtual private network\u201d via a SOCKS5 proxy. A year on, the upgraded version analysed by Sophos provides attackers with a persistent backdoor that automates a number of key activities so that operators &hellip; Continue reading \"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/","og_site_name":"Market Newsdesk","article_published_time":"2020-12-16T14:03:37+00:00","og_image":[{"url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators","datePublished":"2020-12-16T14:03:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/"},"wordCount":717,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/","name":"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=","datePublished":"2020-12-16T14:03:37+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#primaryimage","url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg=","contentUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODExMjg5MCMzODgzMjY0IzIwOTAwNzg="},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/sophos-reports-on-how-systembc-has-developed-into-an-off-the-shelf-tor-backdoor-used-by-ransomware-operators\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/400951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=400951"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/400951\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=400951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=400951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=400951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}