In a report, ESET stated it found a uncommon malware called RAMSAY, pressure that seems to have been particularly developed to leap the air hole and attain remoted networks.

Based on what ESET has been in a position to glean from the Ramsay malware samples it found, assaults with the Ramsay toolkit have been seen working by the next sample:

  • Victim receives an electronic mail with an connected RTF file.
  • If the sufferer downloads and runs the doc, the file tries to make use of the CVE-2017-1188 or CVE-2017-0199 vulnerabilities to contaminate the consumer with the Ramsay malware.
  • The Ramsay “collector” module kicks in. This module searches the sufferer’s complete pc and gathers Word, PDF, and ZIP documents in a hidden storage folder.
  • The Ramsay “spreader” module additionally kicks in. This module appends a duplicate of the Ramsay malware to all PE (transportable executable) information discovered on detachable drives and community shares.
  • Malware waits till the attacker deploys one other module that may exfiltrate the collected knowledge.
ramsay malware

ESET says that in its analysis, it was not in a position to establish any Ramsay exfiltration module simply but.

Nonetheless, ESET says the malware has been used within the wild.

“We initially found an instance of Ramsay in VirusTotal,” stated ESET researcher Ignacio Sanmillan. “That sample was uploaded from Japan and led us to the discovery of further components and versions of the framework.”


Air-gapped methods are computer systems or networks which are remoted from the remainder of an organization’s community and minimize off from the general public web.

Air-gapped computer systems/networks are sometimes discovered on the networks of presidency businesses and huge enterprises, the place they normally retailer top-secret documents or mental property.

Getting entry to an air-gapped community is usually thought-about the Holy Grail of any safety breach, as these methods are sometimes inconceivable to breach because of the air hole (lack of any connection to close by units).


ESET stated they have been in a position to observe down three completely different variations of the Ramsay malware framework, one compiled in September 2019 (Ramsay v1), and two others in early and late March 2020 (Ramsay v2.a and v2.b).

Sanmillan stated ESET found “substantial evidence to conclude that this framework is at a developmental stage,” and that the hackers are nonetheless tinkering with the code.

RS Cyber Solution

We have the best network technicians to remove malware from your network. Feel free to contact us.

For instance, the e-mail supply strategies have different, and in current Ramsay variations, the malware additionally collected PDF and ZIP information, on high of Word documents.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
Subscribe Us
Send message