A new Petya like ransomware named Bad Rabbit was discovered spreading in many European countries affecting both government and private agencies.Ransomware has already been spread across countries like Russia, Ukraine, Bulgaria, Germany, and Turkey.
[lgc_column grid="100" tablet_grid="100" mobile_grid="100" last="false" style="background-color: #dcdcdc;]
In Capsule:- A new ransomware named ‘Bad Rabbit’ has been found spreading across European countries
- Russia, Ukraine, Bulgaria, Germany, and Turkey are the nations affected till date
- ‘Bad Rabbit’ shows similar characteristics like Petya and NotPetya ransomware
- Ransomware was spread vïa fake adobe flash player using Eternal Blue exploit
- ‘Bad Rabbit’ demands ransom of 0.05 Bitcoin
You may be interested in reading:New Ransomware Magniber Targets South KoreaWhen we click the install button it downloads an executable file from 1dnscontrol[.]com is initiated and this executable file, install_flash_player.exe is the dropper for Win32/Filecoder.DAfter that, it encrypts the files and show a ransom note which demands the user to pay 0.05 Bitcoin (around 280$).
In the ransom note, it is mentioned that the user has got 40 hours to pay or else the amount will be increased.The source code in ransomware contains the reference to various Game of Throne characters and dragons.Christiaan Beek, Lead Scientist and Principal Engineer at McAfee has released a list of file types targeted by Bad Rabbit which is given below:.3ds .7z .accdb .ai .asm .asp .aspx .avhd .back .bak .bmp .brw .c .cab .cc .cer .cfg .conf .cpp .crt .cs .ctl .cxx .dbf .der .dib .disk .djvu .doc .docx .dwg .eml .fdb .gz .h .hdd .hpp .hxx .iso .java .jfif .jpe .jpeg .jpg .js .kdbx .key .mail .mdb .msg .nrg .odc .odf .odg .odi .odm .odp .ods .odt .ora .ost .ova .ovf .p12 .p7b .p7c .pdf .pem .pfx .php .pmf .png .ppt .pptx .ps1 .pst .pvi .py .pyc .pyw .qcow .qcow2 .rar .rb .rtf .scm .sln .sql .tar .tib .tif .tiff .vb .vbox .vbs .vcb .vdi .vfd .vhd .vhdx .vmc .vmdk .vmsd .vmtm .vmx .vsdx .vsv .work .xls .xlsx .xml .xvd .zipResearch from Kaspersky has advisedusers to follow the below given instructions to prevent Bad Rabbit ransomware from infecting your systems;- Block the execution of files c:windowsinfpub.dat and c:Windowscscc.dat and
- Disable WMI service (if it’s possible in your environment) to prevent the malware from spreading over your network
- hxxp://argumentiru[.]com
- hxxp://www.fontanka[.]ru
- hxxp://grupovo[.]bg
- hxxp://www.sinematurk[.]com
- hxxp://www.aica.co[.]jp
- hxxp://spbvoditel[.]ru
- hxxp://argumenti[.]ru
- hxxp://www.mediaport[.]ua
- hxxp://blog.fontanka[.]ru
- hxxp://an-crimea[.]ru
- hxxp://www.t.ks[.]ua
- hxxp://most-dnepr[.]info
- hxxp://osvitaportal.com[.]ua
- hxxp://www.otbrana[.]com
- hxxp://calendar.fontanka[.]ru
- hxxp://www.grupovo[.]bg
- hxxp://www.pensionhotel[.]cz
- hxxp://www.online812[.]ru
- hxxp://www.imer[.]ro
- hxxp://novayagazeta.spb[.]ru
- hxxp://i24.com[.]ua
- hxxp://bg.pensionhotel[.]com
- hxxp://ankerch-crimea[.]ru
Read more on:Ransomware - How can you effectively tackle the challenges?
To protect yourself from Bad Rabbit ransomware follow the below instructions :
- Keep the operating system and third-party applications (MS office, flash player, browsers, browser Plugins) up-to-date with the latest patches. In this case, Especially check the Eternal Blue vulnerability patch.
- Perform regular backups. Ideally, this data should be kept on a separate device, and backups should be stored offline.
- Maintain updated Antivirus software on all systems.
- Don’t open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited email, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization’s website directly through the browser.
You may be interested in reading:NRansom! Pay ransom not as Bitcoins but as Your Nudes!
About the Author
[lgc_column grid="15" tablet_grid="25" mobile_grid="25" last="false"]
[/lgc_column][lgc_column grid="85" tablet_grid="75" mobile_grid="75" last="true" style="background-color: #ffffff;"]Ashique is a self motivated and passionate security analyst with a good knowledge in computer networking, security analysis, vulnerability assessment and penetration testing.
[/lgc_column][lgc_column grid="85" tablet_grid="75" mobile_grid="75" last="true" style="background-color: #ffffff;"]Ashique is a self motivated and passionate security analyst with a good knowledge in computer networking, security analysis, vulnerability assessment and penetration testing. [/lgc_column]