WorldLeaks Ransomware Unleashes New ‘RustyRocket’ Malware

▼ Summary
– World Leaks, a ransomware group, has deployed a new, sophisticated malware called RustyRocket to stealthily maintain access to victim networks.
– Unlike typical ransomware that encrypts data, World Leaks specializes in stealing sensitive data and threatening to publish it unless a ransom is paid.
– RustyRocket is a data exfiltration tool written in Rust that targets Windows and Linux, using encrypted tunnels to blend malicious activity with legitimate traffic, making it exceptionally hard to detect.
– The group typically gains initial access through methods like social engineering or stolen credentials, then uses tools like RustyRocket to persist in the network and gather data for extortion.
– To defend against such attacks, Accenture recommends organizations monitor for unusual data transfers and implement network segmentation to limit attacker movement.
A sophisticated new malware tool named ‘RustyRocket’ has been identified as a key component in the arsenal of the notorious cyber extortion group World Leaks. Research from Accenture Cybersecurity reveals this previously unseen threat is designed for stealthy data theft and maintaining long-term access within corporate networks, posing a significant challenge to traditional security defenses.
The malware, crafted in the Rust programming language, functions as a sophisticated data exfiltration and proxy tool. It targets both Windows and Linux systems, allowing attackers to secretly steal information through complex, encrypted tunnels that blend malicious traffic with normal network activity. This obfuscation makes RustyRocket’s operations exceptionally difficult for security teams to detect.
World Leaks operates as a data extortion group rather than a traditional ransomware operation. Instead of encrypting files, they specialize in stealing sensitive corporate and personal data. They then threaten to publish the stolen information unless a ransom is paid. The group has claimed high-profile victims, including sportswear giant Nike, where they leaked over 188,000 files after the company refused their demands.
A key feature of RustyRocket is its novel execution guardrail. The malware requires a pre-encrypted configuration to be entered at runtime, a technique that makes it highly resistant to monitoring and analysis. This design grants attackers significant flexibility to adapt their operations within a compromised environment.
“In short, this means RustyRocket is extremely hard to spot and highly flexible, making it perfectly crafted to steal data, proxy networks, and spearhead extortion focused cyber attacks,” explained T. Ryan Whelan, Managing Director and global head of Accenture cyber intelligence.
World Leaks typically gains initial access to networks through methods like social engineering, exploiting stolen login credentials, or targeting exposed infrastructure. Once inside, tools like RustyRocket enable them to establish a persistent foothold. This allows the group to move laterally, spend time identifying and collecting the most valuable data, and ultimately use that information for blackmail.
Security experts emphasize that this development signals an evolution in attacker techniques. RustyRocket exemplifies how threat actors are innovating to bypass conventional security measures. Defending against such advanced threats requires a proactive and layered security strategy.
Accenture recommends that organizations enhance their defenses by monitoring for unusual outbound data transfers, which could signal exfiltration. Implementing strict network segmentation is also critical to contain attackers and limit their ability to move laterally across systems. A comprehensive defense should integrate continuous threat exposure management, rigorous security testing, and red team exercises, coupled with ongoing employee training to recognize initial attack vectors like phishing.
(Source: InfoSecurity Magazine)


