{"id":44868,"date":"2022-01-18T00:00:00","date_gmt":"2022-01-18T00:00:00","guid":{"rendered":"urn:uuid:f23c3a6b-e7eb-0d5a-4d08-8c3b41f04d71"},"modified":"2022-01-18T00:00:00","modified_gmt":"2022-01-18T00:00:00","slug":"new-ransomware-spotted-white-rabbit-and-its-evasion-tactics","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/","title":{"rendered":"New Ransomware Spotted: White Rabbit and Its Evasion Tactics"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <!-- Begin mPulse library --> <!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"ransomware,research,articles, news, reports,cyber threats,apt &amp; targeted attacks\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2022-01-18\"> <meta property=\"article:tag\" content=\"ransomware\"> <meta property=\"article:section\" content=\"research\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/a\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.html\"> <title>New Ransomware Spotted: White Rabbit and Its Evasion Tactics<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/a\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.html\"><br \/>\n<meta property=\"og:title\" content=\"New Ransomware Spotted: White Rabbit and Its Evasion Tactics\"><br \/>\n<meta property=\"og:description\" content=\"We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\/new_ransomware_spotted_white_rabbit_and_its_evasion_tactics.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"New Ransomware Spotted: White Rabbit and Its Evasion Tactics\"><br \/>\n<meta name=\"twitter:description\" content=\"We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\/new_ransomware_spotted_white_rabbit_and_its_evasion_tactics.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"49.879222825136\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"443389289\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"9.7230769230769\">\n<div class=\"article-details\" role=\"heading\" readability=\"38.892307692308\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Ransomware<\/p>\n<p class=\"article-details__description\">We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer.<\/p>\n<p class=\"article-details__author-by\">By: Arianne Dela Cruz, Bren Matthew Ebriega, Don Ovid Ladores, Mary Yambao <time class=\"article-details__date\">January 18, 2022<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"richText\" readability=\"39.860724233983\">\n<div readability=\"25.589600742804\">\n<p>We spotted&nbsp;the&nbsp;new&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/Ransomware\">ransomware<\/a>&nbsp;family&nbsp;White Rabbit&nbsp;discretely&nbsp;making a name for itself&nbsp;by&nbsp;executing&nbsp;an&nbsp;attack on a local US&nbsp;bank&nbsp;in December&nbsp;2021.&nbsp;This newcomer takes a&nbsp;page from&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/l\/egregor-ransomware-launches-string-of-high-profile-attacks-to-en.html\">Egregor<\/a>,&nbsp;a&nbsp;more established ransomware family,&nbsp;in hiding its malicious activity&nbsp;and&nbsp;carries a&nbsp;potential connection to the&nbsp;advanced persistent threat (APT) group&nbsp;FIN8.<\/p>\n<p><span class=\"body-subhead-title\">Use of a command-line password<\/span><\/p>\n<p>One of the most notable aspects of White Rabbit\u2019s attack is&nbsp;how&nbsp;its&nbsp;payload binary&nbsp;requires a specific command-line password&nbsp;to decrypt its internal configuration&nbsp;and proceed with&nbsp;its&nbsp;ransomware routine.&nbsp;This method of hiding malicious activity is&nbsp;a trick&nbsp;that&nbsp;the ransomware family&nbsp;Egregor&nbsp;uses to&nbsp;hide&nbsp;malware techniques from&nbsp;analysis.&nbsp;<\/p>\n<p>White Rabbit\u2019s&nbsp;payload is inconspicuous at first glance, being a small file of around 100&nbsp;KB&nbsp;with no notable strings and seemingly no activity. The telltale sign of its malicious&nbsp;origin&nbsp;is the presence of strings for logging, but the actual behavior would not be easily&nbsp;observed&nbsp;without the correct password.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\/systracer.jpg\" alt=\"Figure 1. SysTracer showing the command line used to execute the ransomware\"><figcaption>Figure 1. SysTracer showing the command line used to execute the ransomware<\/figcaption><\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\" readability=\"37\">\n<div readability=\"19\">\n<p>The sample we analyzed used the password&nbsp;or&nbsp;passphrase \u201cKissMe,\u201d as can be seen in Figure 1, although other samples might use a different password. Figure 1 also shows the arguments accepted by the&nbsp;ransomware,&nbsp;which we surmise&nbsp;as&nbsp;standing&nbsp;for the following:<\/p>\n<ul>\n<li><span class=\"rte-circle-bullet\">-p:&nbsp;password\/passphrase<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">-f:&nbsp;file to&nbsp;be&nbsp;encrypted<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">-l:&nbsp;logfile<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">-t:&nbsp;malware\u2019s start time<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Arrival and relation to an APT<\/span><\/p>\n<p>Our internal telemetry shows&nbsp;traces of&nbsp;Cobalt Strike&nbsp;commands&nbsp;that might&nbsp;have been used to reconnoiter, infiltrate, and&nbsp;drop the malicious payload into the affected system.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\/cobalt%20strike%20white%20rabbit.PNG\" alt=\"Figure 2. Evidence showing traces of Cobalt Strike\"><figcaption>Figure 2. Evidence showing traces of Cobalt Strike<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"34.984756097561\">\n<div readability=\"18.658536585366\">\n<p>Meanwhile,&nbsp;<a href=\"https:\/\/lodestone.com\/insight\/white-rabbit-ransomware-and-the-f5-backdoor\/\" target=\"_blank\" rel=\"noopener\">researchers<\/a>&nbsp;from Lodestone have pointed out that the malicious URL connected to the attack is also related to the APT group&nbsp;called&nbsp;FIN8.&nbsp;They&nbsp;have likewise&nbsp;noted&nbsp;White Rabbit\u2019s&nbsp;use of a never-before-seen version of&nbsp;Badhatch,&nbsp;an F5 backdoor&nbsp;that is&nbsp;also&nbsp;associated with FIN8.&nbsp;Unfortunately, at the time of the analysis, files from the said URL&nbsp;were no longer available.<\/p>\n<p><span class=\"body-subhead-title\">The&nbsp;ransomware routine<\/span><\/p>\n<p>The ransomware routine itself is not complicated.&nbsp;Like many&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them\">modern ransomware<\/a>&nbsp;families, White Rabbit uses&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them\">double extortion<\/a>&nbsp;and threatens its targets&nbsp;that their stolen data will be published or sold, as seen in their ransom note.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\/ransom%20note%20white%20rabbit.jpg\" alt=\"Figure 3. White Rabbit ransom note\"><figcaption>Figure 3. White Rabbit ransom note<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"48.533404787424\">\n<div class=\"responsive-table-wrap\" readability=\"44.20864594498\">\n<p>The&nbsp;ransomware creates a note for each file&nbsp;it encrypts. Each note&nbsp;bears&nbsp;the name of the encrypted file and&nbsp;is&nbsp;appended with&nbsp;\u201c.scrypt.txt.\u201d&nbsp;Prior to the ransomware routine, the malware&nbsp;also&nbsp;terminates&nbsp;several processes and services, particularly&nbsp;antivirus-related&nbsp;ones.\u202f<\/p>\n<p>The malware then tries to encrypt&nbsp;files&nbsp;(if&nbsp;the&nbsp;-f argument is not given)&nbsp;in&nbsp;fixed,&nbsp;removable,&nbsp;and&nbsp;network&nbsp;drives,&nbsp;as well as&nbsp;resources. It also tries to skip the following paths&nbsp;and&nbsp;directories to avoid crashing the system and&nbsp;destroying its own notes:<\/p>\n<ul>\n<li><span class=\"rte-circle-bullet\">*.scrypt.txt<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.scrypt<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">c:\\windows\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*:\\sysvol\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*:\\netlogon\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">c:\\filesource\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.exe<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.dll<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*\\desktop.ini<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*:\\windows\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">c:\\programdata\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*:\\programfiles\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*:\\program files (x86)\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*:\\program files (x64)\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.lnk<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.iso<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.msi<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.sys<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">*.inf<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">%User Temp%\\*<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">&nbsp;*\\thumbs.db<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Conclusion<\/span><\/p>\n<p>Currently, we are still determining if FIN8 and&nbsp;White Rabbit&nbsp;are indeed&nbsp;related or&nbsp;if&nbsp;they share the same creator. Given that FIN8&nbsp;is known mostly for its&nbsp;infiltration and reconnaissance tools,&nbsp;the connection could be an indication of how&nbsp;the group is&nbsp;expanding&nbsp;its&nbsp;arsenal to include&nbsp;ransomware.&nbsp;So far, White Rabbit\u2019s targets have been&nbsp;few,&nbsp;which&nbsp;could mean&nbsp;that they are still&nbsp;testing the waters or&nbsp;warming up&nbsp;for&nbsp;a large-scale&nbsp;attack.<\/p>\n<p>White Rabbit is&nbsp;thus&nbsp;likely still in its development phase, considering its uncomplicated ransomware routine. Despite being in&nbsp;this early stage,&nbsp;however,&nbsp;it is important to highlight that it bears the troublesome characteristics of modern ransomware: It is, after all, highly targeted and uses double extortion methods.&nbsp;As such, it is worth monitoring.<\/p>\n<p>A multilayered defense can help guard against modern ransomware and prevent the success of the evasion tactics they employ. Organizations can&nbsp;mitigate risks by&nbsp;taking&nbsp;these&nbsp;steps&nbsp;and&nbsp;employing these&nbsp;solutions:<\/p>\n<ul>\n<li><span class=\"rte-circle-bullet\">Deploy cross-layered detection and response solutions.&nbsp;Find solutions that can anticipate and respond to ransomware activities, techniques, and movements before the threat culminates.&nbsp;&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/vision-one.html\">Trend Micro Vision One\u2122\ufe0f<\/a>&nbsp;helps detect and block ransomware components to stop attacks before they can affect an enterprise.<\/span><\/li>\n<li>&nbsp;<\/li>\n<li><span class=\"rte-circle-bullet\">Create&nbsp;a playbook for&nbsp;attack&nbsp;prevention and recovery.&nbsp;Both an incident response (IR)&nbsp;<a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-61\/rev-2\/final\">playbook<\/a>&nbsp;and&nbsp;IR&nbsp;<a href=\"https:\/\/www.cynet.com\/incident-response\/incident-response-sans-the-6-steps-in-depth\/\">frameworks<\/a>&nbsp;allow organizations&nbsp;to plan&nbsp;for&nbsp;different&nbsp;attacks, including ransomware.<\/span><\/li>\n<li>&nbsp;<\/li>\n<li><span class=\"rte-circle-bullet\"><span>Conduct attack simulations.&nbsp;Expose employees to a&nbsp;<a href=\"https:\/\/www.nytimes.com\/2021\/06\/03\/us\/politics\/ransomware-cybersecurity-infrastructure.html\">realistic cyberattack simulation<\/a>&nbsp;that can help&nbsp;decision-makers, security personnel, and IR teams&nbsp;identify and prepare&nbsp;for&nbsp;potential security gaps&nbsp;and atta<\/span>cks.<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Indicators of Compromise (IOCs)<\/span><\/p>\n<p>URL:<\/p>\n<p>hxxps:\/\/104-168-132-128[.]nip[.]io\/cae260<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/a\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44869,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9539,9509],"class_list":["post-44868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-ransomware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Ransomware Spotted: White Rabbit and Its Evasion Tactics 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Ransomware Spotted: White Rabbit and Its Evasion Tactics 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Ransomware Spotted: White Rabbit and Its Evasion Tactics\",\"datePublished\":\"2022-01-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\"},\"wordCount\":1011,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Ransomware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\",\"name\":\"New Ransomware Spotted: White Rabbit and Its Evasion Tactics 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg\",\"datePublished\":\"2022-01-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg\",\"width\":487,\"height\":346},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Ransomware Spotted: White Rabbit and Its Evasion Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Ransomware Spotted: White Rabbit and Its Evasion Tactics 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/","og_locale":"en_US","og_type":"article","og_title":"New Ransomware Spotted: White Rabbit and Its Evasion Tactics 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-18T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/new-ransomware-spotted--white-rabbit-and-its-evasion-tactics-","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Ransomware Spotted: White Rabbit and Its Evasion Tactics","datePublished":"2022-01-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/"},"wordCount":1011,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Ransomware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/","url":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/","name":"New Ransomware Spotted: White Rabbit and Its Evasion Tactics 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg","datePublished":"2022-01-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/01\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics.jpg","width":487,"height":346},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-spotted-white-rabbit-and-its-evasion-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"New Ransomware Spotted: White Rabbit and Its Evasion Tactics"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44868"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44869"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}