RedCurl Deploys Novel QWCrypt, Moving from Cyber Espionage to Ransomware Attacks

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

The cybercrime landscape is witnessing a change in strategy by RedCurl, a Russian-speaking hacking group previously known for its corporate espionage operations. For the first time, the group has been linked to a ransomware campaign involving novel ransomware strain QWCrypt.

Targeting organizations across regions such as Canada, Germany, Norway, and the United States since 2018, RedCurl has traditionally focused on espionage, relying on spear-phishing emails and human resource-themed lures to infiltrate systems. 

However, recent activities reveal a pivot in their approach, with ransomware now being their arsenal's newest addition, according to a report by Romanian cybersecurity firm Bitdefender.

Screensaver (.SCR) files are just renamed executables
Screensaver (.SCR) files are just renamed executables | Source: Bitdefender

The attack method employed remains rooted in the group's established phishing tactics – fake CVs presented as mountable ISO disk images are used to deliver the QWCrypt ransomware. 

Disguised files exploit DLL side-loading techniques, leveraging legitimate Windows processes to install malicious loaders like "RedLoader,” a tool previously observed in phishing campaigns earlier this year.

DLL sideloading and order execution hijacking
DLL sideloading and order execution hijacking | Source: Bitdefender

Once installed, the loader executes various stages of malware, culminating in the deployment of QWCrypt. Bitdefender uncovered that QWCrypt encrypts data hosted on virtual infrastructures, even rendering virtual machines unbootable. 

The objective is to cause widespread disruption with minimal effort by targeting virtualized environments critical to modern business operations.

The ransomware employs advanced techniques such as Bring Your Own Vulnerable Driver (BYOVD) to neutralize endpoint security software before encryption. 

Further, the ransom note left on compromised systems borrows heavily in design and content from groups like LockBit, HardBit, and Mimic. Interestingly, no associated leak site has been identified yet, leaving questions about RedCurl’s ultimate motives.

The group’s ability to effortlessly transition between espionage tactics and ransomware attacks highlights its growing sophistication. However, their use of tactics such as rehashed ransom note text also raises questions about whether this campaign aims solely for extortion or has alternative motives.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: