#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39 C
Dubai
Friday, August 22, 2025
HomeTopics 1Advanced Persistent ThreatNew Charon Ransomware Adopts Earth Baxia APT Techniques to Target Enterprises

New Charon Ransomware Adopts Earth Baxia APT Techniques to Target Enterprises

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

On 12 August 2025, Trend Micro researchers revealed the emergence of Charon, a new ransomware family deploying advanced persistent threat (APT)-level tactics historically linked to the Earth Baxia group. The campaign, detected in the Middle East’s public sector and aviation industry, blends DLL sideloading, process injection, and anti-EDR capabilities – marking a concerning escalation in targeted ransomware sophistication.

Trend Micro’s Trend Vision One platform first detected the Charon campaign in early August 2025 during incident investigations in Middle Eastern public sector and aviation entities. The attack chain echoed Earth Baxia’s prior government-targeting operations, although researchers stopped short of attributing it directly to the APT due to lack of shared infrastructure evidence.

The earliest confirmed incident involved the abuse of a legitimate Edge.exe binary (originally cookie_exporter.exe) to sideload a malicious msedge.dll loader, dubbed SWORDLDR, which decrypted and injected the ransomware into a spawned svchost.exe process.

Technical Analysis: APT Techniques Meet Ransomware

Attack Chain Overview

  1. Initial Execution – Legitimate signed binary (Edge.exe) used for DLL sideloading.
  2. Payload Loader (SWORDLDR) – Decrypts encrypted shellcode from DumpStack.log.
  3. Process Injection – Injects ransomware into svchost.exe to bypass security tools.
  4. File Encryption – Network shares and local drives encrypted, with .Charon extension appended.
  5. Ransom Note – Custom note (How To Restore Your Files.txt) naming the victim organization.

The multistage payload extraction used double encryption layers within DumpStack.log, revealing Charon’s payload only after deep forensic decryption.

Anti-EDR Capabilities

Although dormant in this variant, analysts found an embedded driver (WWC.sys) compiled from the public Dark-Kill project, designed to disable endpoint detection and response (EDR) systems — indicating possible future enhancements.

“The convergence of APT-grade evasion with ransomware’s destructive impact represents a dangerous escalation in threat actor capabilities,” warned Jacob Santos, senior threat researcher at Trend Micro, on 12 August 2025.

Encryption Methodology

Charon’s hybrid cryptography combines Curve25519 elliptic curve with the ChaCha20 stream cipher, delivering:

  • Partial encryption for speed efficiency, varying by file size.
  • 72-byte metadata footer containing victim-specific keys for decryption.
  • Infection marker "hCharon is enter to the urworld!" appended to encrypted files.

It also:

  • Stops security-related services and processes.
  • Deletes shadow copies and empties the recycle bin.
  • Prioritizes network share encryption if --sf flag is set.

Targeted Ransom Demands

Unlike opportunistic ransomware, Charon’s ransom notes reference victims by name, reflecting customized extortion. This approach, coupled with its targeted sector choice, suggests detailed reconnaissance before deployment.

“We are witnessing ransomware operators close the gap with nation-state actors in terms of sophistication,” said Don Ovid Ladores, malware analyst at Trend Micro. “This demands a rethink of enterprise defense priorities.”

MEA and Global Context

Regional Impact

The confirmed targeting of Middle Eastern public sector and aviation raises concern for other critical industries in the region. Many MEA nations depend on OT and IT systems susceptible to DLL sideloading and share-based propagation.

Global Trends

Globally, ransomware operators are increasingly borrowing APT TTPs — a shift that:

  • Complicates attribution.
  • Increases stealth and dwell time.
  • Elevates operational disruption risk across critical infrastructure sectors.

MITRE ATT&CK Mapping (Observed TTPs)

Technique IDNameUse in Charon
T1574.002Hijack Execution Flow: DLL Side-LoadingInitial payload loading via Edge.exe
T1055.001Process Injection: svchost.exeRansomware execution masquerading as legitimate process
T1486Data Encrypted for ImpactEncryption of local and network files
T1562.001Impair Defenses: Disable or Modify ToolsStops AV/EDR processes and services
T1070.004File Deletion: Shadow Copy DeletionRemoves recovery points
T1021.002Remote Services: SMB/Windows Admin SharesLateral movement via network share enumeration

Actionable Takeaways for Defenders

  1. Restrict DLL loading paths — prevent unsigned DLLs from running alongside trusted binaries.
  2. Monitor process spawning patterns — flag signed binaries launching unusual DLLs or svchost.exe instances.
  3. Segment networks — limit access to sensitive shares and disable ADMIN$ unless strictly necessary.
  4. Harden EDR protections — ensure tamper protection is enabled against service and process termination.
  5. Implement offline/immutable backups — safeguard against shadow copy deletion.
  6. Limit privileges — enforce least privilege for both users and service accounts.
  7. Train staff — enhance security awareness on phishing, malicious attachments, and suspicious downloads.
  8. Audit for Charon IOCs — including the .Charon extension and “hCharon is enter to the urworld!” file marker.
  9. Enable PowerShell and driver-level logging to detect sideloading or driver drop attempts.
  10. Review vendor threat feeds — leverage platforms like Trend Vision One™ for up-to-date threat intelligence.

Conclusion

The Charon ransomware campaign underscores a dangerous evolution: APT-level tactics in financially motivated ransomware. By blending Earth Baxia-style sideloading with targeted extortion, Charon raises both the stealth and impact of attacks. Organizations — especially in high-value sectors like aviation and public services — must adapt with layered defenses, proactive threat hunting, and incident readiness. The convergence of nation-state techniques with cybercrime motives makes resilience, not just prevention, the new baseline for enterprise cybersecurity.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here