Rising Threat of Charon Ransomware Targeting the Middle East
A New Player in Cybercrime
Cybersecurity experts have recently identified an alarming new trend involving a previously unseen ransomware family, named Charon, which is currently targeting public sector entities and the aviation industry in the Middle East. This revelation comes from research conducted by Trend Micro, highlighting sophisticated tactics reminiscent of advanced persistent threat (APT) groups.
Tactics Mimicking APT Groups
The threat actor behind Charon has adopted a set of tactics that are highly advanced, including methods such as DLL side-loading and process injection. These techniques allow the malware to evade traditional endpoint detection and response (EDR) systems effectively. In particular, the DLL side-loading method reflects strategies previously linked to a Chinese hacker group known as Earth Baxia, which has been involved in attacks against government sectors in Taiwan and the Asia-Pacific region.
Technical Details of the Attack
Researchers Jacob Santos, Ted Lee, Ahmed Kamal, and Don Ovid Ladore explained that the attack employed a legitimate file related to a browser, specifically Edge.exe (originally cookie_exporter.exe), to load a malicious file named msedge.dll (SWORDLDR). This action led to the installation of the Charon ransomware payload.
Once activated, Charon mimics behaviors typical of ransomware tools. It can disrupt essential services and processes, delete backup files and shadow copies, significantly reducing the likelihood of successful data recovery. Moreover, Charon utilizes multithreading and partial encryption techniques, making its file-locking process swift and efficient.
BYOVD Attacks and Future Developments
Another critical aspect of Charon is its use of a driver created from the open-source Dark-Kill project. This driver is designed to disable EDR solutions using a method known as a bring-your-own-vulnerable-driver (BYOVD) attack. Interestingly, it appears this feature hasn’t been activated in the current iteration of Charon, indicating it may still be in the development phase.
Customized Ransom Notes Indicate Targeted Efforts
Unlike typical ransomware campaigns that randomly target victims, the Charon attacks show signs of being highly targeted. One telltale sign is the use of customized ransom notes that specifically mention the victim organization by name, a strategy not often seen in conventional ransomware cases. How the attackers gained initial access to their targets remains unclear.
Possible Links to Earth Baxia
Although there are notable overlaps between Charon’s technical attributes and those associated with Earth Baxia, Trend Micro posits three possible scenarios:
- The possibility that Earth Baxia is directly involved.
- A false flag operation designed to imitate the methods of Earth Baxia.
- The emergence of a new threat actor independently developing similar tactics.
The researchers noted that, without corroborative evidence such as shared infrastructure or consistent targeting patterns, it is challenging to draw definitive conclusions about the origins of Charon.
Increasing Complexity in Ransomware Attacks
The findings underscore a growing trend in which ransomware operators are adopting increasingly sophisticated methods for deploying malware and evading detection. This is blurring the lines between cybercrime and state-sponsored activity, raising concerns across various sectors.
Broader Implications for Organizations
The intersection of APT tactics with ransomware operations presents heightened risks for organizations. This combination merges intricate evasion techniques with the immediate business impacts associated with ransomware, amplifying the stakes for businesses trying to safeguard their digital assets.
The current climate of ransomware threats has been underscored by discussions around another ransomware campaign, Interlock, which leverages ClickFix lures to deliver additional malware payloads, such as NodeSnake for credential theft.
Statistics Highlight the Growing Threat
Recent statistics presented by Barracuda reveal that a staggering 57% of organizations encountered at least one successful ransomware attack in the past year. Among those affected, 71% had previously experienced breaches via email. A surprising 32% opted to pay the ransom; however, only 41% were able to recover all their data, showcasing the significant challenges faced by victims in such scenarios.
In summary, the Charon ransomware signifies a troubling evolution in cyber threats, underscoring the importance of proactive cybersecurity measures for organizations navigating an increasingly perilous digital landscape.


