BadRabbit Attack Appeared To Be Months In Planning

Gigacycle > Information & Guidance  > BadRabbit Attack Appeared To Be Months In Planning

BadRabbit Attack Appeared To Be Months In Planning


Ukraine-Focused Strains of Ransomware Continue to Increase Like Rabbits

BadRabbit Attack Appeared To Be Months In Planning
BadRabbit’s code mashes up NotPetya with references to Game of Thrones. (Source: Endgame)

Repeat question from this year’s NotPetya outbreak: Who’s gunning for Ukraine and how many organizations in other countries will be caught in the crossfire?

See Also: Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach

On Tuesday, numerous organizations reported outages that appeared to trace to BadRabbit infections, including the Kiev metro system and Odessa airport in Ukraine, as well as multiple Russian media organizations, including Interfax. Organizations from Bulgaria to Germany to Japan have reportedly also been affected (see BadRabbit Ransomware Strikes Eastern Europe).

“Because BadRabbit is self-propagating and can spread across corporate networks, organizations should remain particularly vigilant,” security firm Symantec says in a blog post.

But security experts say the BadRabbit ransomware outbreak appears to have hit Ukraine hardest. Ukraine’s Computer Emergency Response Team, CERT-UA, reported that there was a “massive distribution” of BadRabbit in the country.

Security experts say that the simultaneous nature of so many infections in that country suggest that this was a targeted attack and that systems may have been infected well in advance of the outbreak.

It’s unclear how many countries may have been affected. Britain’s National Cyber Security Center, which includes the country’s computer emergency response team, says in a statement that it’s tracking the outbreak. “The NCSC has not received any reports that the U.K. has been affected by this latest malware attack,” it says. “We are monitoring the situation and working with our partners to better understand the threat.” Likewise, US-CERT says that it “has received multiple reports of ransomware infections, known as BadRabbit, in many countries around the world,” but has not yet commented on any potential U.S. impact.

Blocking BadRabbit

Numerous anti-virus vendors say their software will block BadRabbit. In addition, Windows administrators can effect a “kill switch” by adjusting the file “C:windowsinfpub.dat” to be read-only, which will prevent the malware from encrypting any files. Mike Iacovacci, a security researcher at Cybereason, has published detailed instructions.

But the BadRabbit outbreak does not appear to have caused damage on the order of this year’s WannaCry or NotPetya attacks. “While NotPetya contained a wiper component, BadRabbit interestingly includes the capability of a wiper, but I haven’t seen any evidence of its use,” Amanda Rousseau, a self-described malware research unicorn at cyber operations platform vendor Endgame, says in a blog post.

BadRabbit infection attempts peaked two hours after the outbreak began. (Source: Symantec)

Another saving grace for many organizations appears to be that BadRabbit only works if it can trick users. “While WannaCry and NotPetya compromised through more passive victim behavior, BadRabbit requires the victim to actively execute the malicious file,” Rousseau says. “This may be why BadRabbit is – at least initially – seemingly more contained than WannaCry or NotPetya.”

Strong Ties to NotPetya

Researchers from security firms Carbon Black, ESET and Malwarebytes, among others, say BadRabbit appears to be a variant of NotPetya. Slovakia-based security firm ESET, for example, refers to BadRabbit as Diskcoder.D, and says it’s a direct update of Diskcoder.C, aka NotPetya.

“Diskcoder.D has the ability to spread via SMB,” ESET says, referring to the server message block protocol built into Windows. But it says an Equation Group exploit for SMB_v1 known as EternalBlue is not included. “As opposed to some public claims, it does not use the EthernalBlue vulnerability like the Diskcoder.C (Not-Petya) outbreak.”

It’s not clear if BadRabbit was built by code-stealing copycats. But many researchers strongly suspect that based on the code and malicious infrastructure, the same group that spawned NotPetya unleashed BadRabbit.

If so, that would make BadRabbit the fifth Ukraine-focused ransomware outbreak to be seen so far this year. The other ransomware campaigns have involved malware called XData, which looked like AES-NI; PSCrypt, based on Globe Imposter Ransomware; NotPetya, based on Petya; as well as a WannaCry lookalike.

Unlike earlier strains, BadRabbit includes some unique quirks, including peppered references to Game of Thrones, researchers at Moscow-based security firm Kaspersky Lab say. The list of passwords the malware tries to use when spreading includes “love,” “secret,” “sex” and “god,” which as pop culture spotters at the Guardian have noted were the “four most common passwords” named in the 1995 movie “Hackers.”

[embedded content]

Excerpt from 1995 film “Hackers.”

ESET says that Ukraine appears to have been hardest hit by the outbreak, even though the greatest number of infected endpoints were not in that country. Here’s where it saw infections hit:

  • Russia: 65 percent
  • Ukraine: 12.2 percent
  • Bulgaria: 10.2 percent
  • Turkey: 6.4 percent
  • Japan: 3.8 percent
  • Other: 2.4 percent

Those statistics are drawn from endpoints and servers that run ESET’s software. While other anti-virus vendors have reported similar findings, they say that other countries, including Germany, were also hit by a notable number of infections.

Some security researchers say many of the infections are being spread via drive-by downloads from websites that have been infected by malicious JavaScript in what’s known as a watering-hole attack.

“Server-side logic can determine if the visitor is of interest and then add content to the page. In that case, what we have seen is that a popup asking to download an update for Flash Player is shown in the middle of the page,” Marc-Etienne M.Léveillé, a security researcher at anti-virus firm ESET, says in a blog post.

BadRabbit spreads in part via a fake Flash update. (Source: ESET)

If users click “install,” it downloads a malicious “install_flash_player.exe” executable file which serves as a dropper for Diskcoder.D. That ransomware crypto-locks the PC and displays a ransom note directing the victim to an Onion site that demands 0.05 bitcoins – currently worth about $290 – in return for the promise of a decryption key.

BadRabbit’s ransom note. (Source: ESET)

Security experts say files crypto-locked by BadRabbit cannot be forcibly decrypted, meaning unprepared victims are stuck having to consider paying the ransom to recover data (see Please Don’t Pay Ransoms, FBI Urges).

BadRabbit’s execution flow. (Source: Endgame.)

Two bitcoin addresses that Moscow-based cybersecurity firm Group-IB says attackers are using to receive ransom payments on Wednesday collectively received 0.0027 bitcoins via three transactions. But it’s not clear if those might have been ransom payments or intelligence or law enforcement agencies or researchers moving money into the wallets to see where it might go.

BadRabbit’s Onion-based ransom payment site, reachable only via the Tor anonymizing browser (Source: Carbon Black)

Evidence of Extensive Preparation

Costin Raiu, who heads anti-virus vendor Kaspersky Lab’s research team, says that sites hosting the watering hole infections have been exploited since at least July.

The simultaneous nature of so many of this week’s BadRabbit outbreaks, however, could mean they were not infected via watering hole attacks, but rather via direct attacks. “It’s interesting to note that all these big companies were all hit at the same time,” ESET’s Léveillé says. “It is possible that the group already had foot inside their network and launched the watering hole attack at the same time as a decoy. Nothing says they fell for the ‘Flash update.'”

Moscow-based cybersecurity firm Group-IB says in a blog post that “the attack at a first glance appears to be financially motivated.” In part, that’s because attackers have not only demanded ransoms but also taken steps to prevent their attack infrastructure from being disrupted. “For hosting, they used Inferno bullet proof hosting,” Group-IB says (see Hacker Havens: The Rise of Bulletproof Hosting Environments).

But attackers may have had multiple motives. Bart Blaze, a threat intelligence researcher at consultancy PwC, says the impetus for BadRabbit may be “as a cover-up or smokescreen, or for both disruption and extortion.”

Signs of Long-Running Campaign

Indeed, some of the servers used to inject malware into infected endpoints have been active for more than a year, demonstrating that BadRabbit is “part of a long-running campaign,”

Injection servers used in the BadRabbit campaign (Source: RiskIQ)

Klijnsma also says that any apparent financial impetus behind BadRabbit may be a smokescreen. “The goal of the attack using ExPetya back in June was simple: cause as much disruption in the Ukraine and those associated with Ukraine as possible, which also seems the case in the BadRabbit attack.”

Go to Source

No Comments

Sorry, the comment form is closed at this time.