Middle East Sectors targeted by Charon ransomware

Researchers have identified a new campaign leveraging a previously unknown ransomware strain dubbed Charon, targeting the Middle East’s public sector and aviation industry. According to Trend Micro, the threat actor demonstrated tactics commonly associated with advanced persistent threat (APT) groups, including DLL side-loading, process injection and techniques to bypass endpoint detection and response (EDR) solutions. The attack starts with a legitimate browser binary loading a malicious DLL, which deploys the ransomware, with additional obfuscation via encrypted shellcode. Encrypted files receive the .Charon extension and a distinctive marker, while tailored ransom notes are issued for each victim.

Technical Description

A newly discovered ransomware variant, Charon, has emerged as a serious cyber threat, specifically targeting the Middle East’s public sector and aviation industry. This campaign combines advanced persistent threat (APT)-level techniques with tailored ransom demands, raising the stakes well beyond typical ransomware operations. Its methods spanning DLL sideloading, process injection, and sophisticated EDR evasion reflect a high level of skill and a clear intent to cause extensive operational disruption. Such attacks carry the potential for severe consequences, including extended downtime, significant financial losses, and irreversible data destruction.

The intrusion sequence starts with the execution of a legitimate browser-related binary, Edge.exe, originally named cookie_exporter.exe. Attackers exploit this trusted file to sideload a malicious DLL, msedge.dll also known internally as SWORDLDR. Once executed, this DLL decrypts and launches the final ransomware payload.

This sideloading technique shares technical traits with past Earth Baxia operations, though researchers have not confirmed any direct link. To further mask their activity, the threat actors employ a seemingly benign file, DumpStack.log, which in reality hides encrypted shellcode. By decrypting two successive layers of this shellcode, the attackers ultimately extract and execute the Charon ransomware binary.

Operators of the Charon ransomware, which tags encrypted files with the .Charon extension, employ tactics typically associated with nation-state threat actors. Unlike opportunistic cybercriminals, Charon’s operators deliberately select their targets, according to Trend Micro. The ransomware’s name draws from Greek mythology, where Charon ferries souls across the river to the underworld.

Regardless of attribution, Trend Micro warns that Charon’s delivery methods exemplify how tools once exclusive to nation-state groups are now in the hands of ransomware operators meaning even well-protected networks remain vulnerable. Other researchers have also noted growing collaboration between nation-state actors and ransomware groups, with the latter sometimes acting as a cover for cyber-espionage operations.

Technically, Charon leverages a blended encryption strategy, utilizing Curve25519 for secure key exchange and ChaCha20 for encrypting files. To boost both speed and efficiency, it employs partial encryption methods. Compromised files are appended with the .Charon extension and embedded with a distinctive marker “hCharon is enter to the urworld!” serving as a clear indicator of infection. The ransom note is uniquely crafted for each victim, explicitly naming the affected organization and specifying a tailored payment demand. This level of customization highlights the operation’s deliberate, targeted nature, setting it apart from random, opportunistic ransomware campaigns.

Charon also demonstrates the ability to spread laterally across networks, probing for accessible shared resources by leveraging Windows APIs such as NetShareEnum and WNetEnumResource, then encrypting any files found. Further examination uncovered an integrated anti-EDR driver based on the publicly available Dark-Kill project, designed to neutralize endpoint detection tools. Although this capability was inactive in the analyzed sample, its inclusion suggests the potential for more aggressive and destructive variants in the future.

Conclusion:

The Charon ransomware campaign represents a highly targeted and sophisticated threat, blending advanced cryptographic methods, stealthy delivery techniques, and selective victim profiling. Its technical overlaps with known APT activity, combined with capabilities such as network propagation and anti-EDR mechanisms, underscore its potential for significant operational disruption. Even though some features observed in current samples remain dormant, their presence signals the likelihood of more destructive iterations ahead. This evolution highlights the growing convergence of nation-state-grade tactics with financially motivated ransomware operations, posing a serious risk even to well-defended organizations.

Impact

Charon ransomware has the potential to trigger extensive operational outages, halting critical services and disrupting essential workflows within targeted industries. Victims may suffer permanent data loss, incur substantial recovery expenses, and endure major financial setbacks from ransom demands and prolonged business interruptions. Its precision targeting and sophisticated evasion tactics further heighten the risk of enduring security vulnerabilities and lasting reputational damage.

IOC and Context Details

Topics Details
Tactic Name Impact, Persistence, Lateral Movement, Execution, Privilege Escalation, Defense Evasion, Discovery, Initial Access
Technique Name Impact: Inhibit System Recovery, Data Encrypted for Impact
Persistence: Scheduled Task/Job, Create or Modify System Process
Lateral Movement: Remote Services
Execution: Command and Scripting Interpreter
Privilege Escalation: Abuse Elevation Control Mechanism
Defense Evasion: Indicator Removal, Hijack Execution Flow, Impair Defenses
Discovery: File and Directory Discovery, Remote System Discovery
Initial Access: Supply Chain Compromise
Sub Technique Name Persistence – Scheduled Task/Job: Scheduled Task
Persistence – Create or Modify System Process: Windows Service
Lateral Movement – Remote Services: SMB / Windows Admin Shares
Execution – Command and Scripting Interpreter: Windows Command Shell
Privilege Escalation – Abuse Elevation Control Mechanism: Bypass User Account Control
Defense Evasion – Indicator Removal: File Deletion
Defense Evasion – Hijack Execution Flow: DLL
Defense Evasion – Impair Defenses: Disable or Modify Tools
Initial Access – Supply Chain Compromise: Compromise Software Supply Chain
Attack Type Ransomware
Targeted Applications Windows
Region Impacted Middle East
Industry Impacted Aviation
IOC’s Hash
SHA-256: e0a23c0d99c45d40f6ef99c901bacf04bb12e9a3a15823b663b392abadd2444e
SHA-1: 21b233c0100948d3829740bd2d2d05dc35159ccb
MD5: a1a0fd18382769745592226f1f652632
CVE NA

Recommended Actions

  • Advanced Endpoint Security : Deploy robust Endpoint Detection and Response (EDR) solutions capable of detecting DLL sideloading, process injection, and unusual encryption activity to block attacks at the endpoint level.
  • Application Whitelisting: Restrict execution to authorized binaries and DLLs only, particularly on critical systems, reducing the attack surface and preventing unauthorized code from running.
  • Email and Web Filtering : Enhance protections by blocking suspicious attachments, executable downloads, and malicious domains that could be used to deliver the initial ransomware payload.
  • Network Segmentation and Protection : Limit access to network shares, enforce least-privilege permissions, and isolate critical assets to prevent ransomware from spreading laterally across the environment.
  • Secure and Tested Backups : Maintain offline or immutable backups and routinely test recovery procedures to ensure quick and reliable restoration in case of an incident.
  • Timely Patching : Keep operating systems, browsers, and third-party applications up to date to close vulnerabilities exploited by sideloading and other attack techniques.
  • Security Awareness Training : Conduct continuous training programs for employees to raise awareness about phishing, malicious files, and safe handling of unexpected attachments or links.
  • Early Compromise Detection : Monitor for unusual file renaming, suspicious DLL loads, or attempts to disable security tools to identify attacks before they reach the encryption stage.

References

https://www.trendmicro.com/en_fi/research/25/h/new-ransomware-charon.html