Why Does SystemBC Dominate the Ransomware Scene?

By PRODAFT Team on July 30, 2024
Back
Why Does SystemBC Dominate the Ransomware Scene?

In the realm of cybersecurity threats, the emergence of new malware strains is an ever-looming spectre, haunting businesses and individuals alike. Among the myriad of malicious software, one particular type has risen to prominence in recent years: SystemBC.

 

This insidious Socks proxy malware has become a stalwart tool in the arsenal of ransomware operators, leaving devastation in its wake. But what sets SystemBC apart from its counterparts, and why has it become the go-to choice for cybercriminals? Let’s delve into the depths of this pervasive threat to uncover the answers.

 

Get to Know SystemBC

 

SystemBC is not your run-of-the-mill malware. It operates as a sophisticated Socks5 proxy, allowing threat actors to bypass network restrictions and remain stealthy while conducting malicious activities.

Originally discovered in 2019, SystemBC quickly gained notoriety for its versatility and efficiency in facilitating ransomware attacks. Its modular design enables attackers to deploy additional payloads - such as ransomware or information stealers - with ease, making it a preferred tool for cybercriminal operations.

 
3 Reasons Behind the Success of SystemBC 
Dominating the Victim Network

SystemBC includes proxy functionality, which enables attackers to route their traffic through infected systems, thereby hiding the true source of their activities. It can also help them move laterally within a network, spreading their additional payloads across multiple systems. This lateral movement increases the scope and impact of ransomware attacks, maximizing the potential for extortion and data encryption.

 
Dodging the Detection Systems

SystemBC employs an array of evasion tactics specifically tailored to circumvent traditional antivirus solutions, enabling it to operate clandestinely within compromised systems. These tactics include, but are not limited to:

  • Tor Network
    Some SystemBC variants utilize the Tor network to create hidden communication channels, making it harder to trace its activities and maintain anonymity for its operations.
  • Dynamic Loading 

    SystemBC may dynamically load components or payloads into memory rather than writing them to disk, making it harder for static analysis tools to detect its presence.

  • Multiple Variants

    SystemBC exists in multiple variants, including DLL, PowerShell, and JavaScript versions. This diversity complicates detection efforts as it can manifest in different forms, requiring varied detection methods for each variant.

     

    Adapting to Every Situation

    SystemBC’s modular architecture allows threat actors to tailor their attacks to suit their objectives, whether it would be deploying ransomware for financial gain or exfiltrating sensitive data for espionage purposes.

    This flexibility, among other abovementioned features, ensures that SystemBC remains relevant and adaptable in an ever-evolving threat landscape, cementing its status as a preferred tool for cybercriminals.

     

 

 

PRODAFT Team
PRODAFT Team

Get latest articles directly in your inbox, stay up to date