A new ransomware strain dubbed “Contacto” has emerged, showcasing advanced evasion techniques and leveraging the Windows console for execution.
First detected in early January 2025, this ransomware variant demonstrates sophisticated capabilities designed to bypass antivirus detection and maximize its impact on victim systems.
The key features:-
Stealthy Execution: Contacto initiates by retrieving the console window handle and hiding it using ShowWindow(), preventing users from seeing a command prompt and keeping its execution discreet.
Single Instance Enforcement: The ransomware creates a mutex named “ContactoMutex” to ensure only one instance runs at a time, exiting if the mutex already exists.
Privilege Escalation: Contacto attempts to enable a range of Windows privileges, including SeDebugPrivilege, SeRestorePrivilege, and SeTakeOwnershipPrivilege, to gain extensive control over the system.
Flexible Encryption Modes: The ransomware supports multiple encryption modes, including “full,” “fast,” “split,” and “custom,” allowing attackers to tailor the encryption process based on their objectives.
System Manipulation: Contacto disables Windows Defender by manipulating registry keys, deletes Volume Shadow Copies, clears event logs, and empties the Recycle Bin to hinder recovery efforts.
Multi-threaded Encryption: The ransomware utilizes a multi-threaded approach, creating twice the number of threads as available processors to optimize encryption speed.
Besides this, security researcher, somedieyoungZZ noted that Contacto’s encryption process involves several sophisticated steps.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Here below we have mentioned all the encryption process of Contacto:-
The ransomware also employs a unique approach to file encryption, targeting only specific parts of files (headers, footers, or random segments) even in “full” encryption mode. This technique renders files unusable while saving time during the encryption process.
To maintain persistence, Contacto creates a fake scheduled task named “Windows Update BETA” with SYSTEM privileges, set to run on every startup.
After encryption, the ransomware changes the desktop wallpaper to display a ransom note and performs self-deletion to cover its tracks.
While the researcher recommended:-
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar