The Latest on WannaCry, UIWIX, EternalRocks and ShadowBrokers

Credit to Author: Jon Clay| Date: Wed, 24 May 2017 13:22:58 +0000

Email isn't as safe as you think it is.

Ransomware has gained global attention over the course of the last two weeks due to the huge spread of WannaCry. Following the initial attacks, we’ve seen UIWIX, Adylkuzz and now EternalRocks come onto the scene leveraging the same core set of vulnerabilities.

The common thread between the three threats is MS17-010 along with other tools and vulnerabilities released by Shadow Brokers. These attacks are not only exploiting vulnerabilities in systems, but also taking advantage of fundamental struggles faced by all organizations with patch management and system upgrades. Let’s look at the impact and consider why these threats are occurring.

But first, here’s a quick look at the comparison between WannaCry, UIWIX and EternalRocks:

WannaCryUIWIXEternalRocks
Attack VectorsSMB vulnerabilities (MS17-010), TCP port 445SMB vulnerabilities (MS17-010), TCP port 445 SMB vulnerabilities (MS17-010), five vulnerabilities and two tools, TCP port 445
File TypeExecutable (EXE)Dynamic-link Library (DLL)Executable (EXE)
Appended extension{original filename}.WNCRY._{unique id}.UIWIXN/A
Autostart and persistence mechanismsRegistryNoneScheduled Tasks
Anti-VM, VM check, or anti-sandbox routinesNoneChecks presence of VM and sandbox-related files or foldersNone
Network activityOn the internet, scans for random IP addresses to check if it has an open port 445 (Propagation);  connects to .onion site using Tor browser (C&C Communication)Uses mini-tor.dll to connect to .onion site (its C&C) to send encrypted information and gathered information (C&C communication)On the internet, scans for random IP addresses to check if it has an open port 445 (Propagation) ;  connects to .onion site using Tor browser (C&C communication)
Exceptions (doesn’t execute if it detects certain system components)NoneTerminates itself if found running in Russia, Kazakhstan, and BelarusN/A
Exclusions (directories or file types it doesn’t encrypt)Avoids encrypting files in certain directoriesAvoids encrypting files in two directories, and files with certain strings in their file nameN/A
Network scanning and propagationYes (worm-like propagation)NoYes (worm-like propagation)
Kill switchYesNoN/A
Number of targeted file types176All files in the affected system except those in its exclusion listN/A
Shadow copies deletionYesNoN/A
Languages supported (ransom notes, payment site)Multilingual (27)English onlyN/A

 

The impact

At last count, WannaCry alone had infected 230,000 users in some 150 countries. Given the massive spread and variety of these malwares, however, the payout so far has only been about $110,000. This demonstrates that the largest impact wasn’t financial, but physical. Organizations in some industries, including healthcare, were forced to shut down their systems to stop the malware propagation. This brings a digital threat into the physical world and gives real world impact to these attacks.

However, EternalRocks doesn’t drop any malicious payload. Despite leveraging five vulnerabilities and two reconnaissance tools, it doesn’t leave any malicious content behind. It does leverage the DoublePulsar exploit which allows a backdoor into the infected system, likely for later use by the threat actors.

Why are they doing it?

When threat actors get into a system and don’t drop a malicious payload, it brings up the potential that they’re leaving behind something else in turn. It’s possible that the attackers are preparing the network for future use. It could also be a distraction while other vulnerabilities are being exploited while no one is watching.

The first line of defense for all of these threats is to patch your systems against all of the vulnerabilities disclosed by ShadowBrokers. Trend Micro offers a variety of solutions, support and tools to help organizations protect against and respond to these threats. Learn more about the latest threats and how to prepare on today’s webinar at 12 p.m. Central time.

http://feeds.trendmicro.com/TrendMicroSimplySecurity