{"id":10067,"date":"2017-10-24T15:10:27","date_gmt":"2017-10-24T23:10:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/24\/news-3840\/"},"modified":"2017-10-24T15:10:27","modified_gmt":"2017-10-24T23:10:27","slug":"news-3840","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/24\/news-3840\/","title":{"rendered":"BadRabbit ransomware strikes Eastern Europe"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 24 Oct 2017 21:53:05 +0000<\/strong><\/p>\n<p>A new strain of ransomware called BadRabbit is spreading through Eastern Europe. Likely created by the same authors as the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/petya-esque-ransomware-is-spreading-across-the-world\/\" target=\"_blank\" rel=\"noopener\">Petya\/Not Petya ransomware<\/a> outbreak in June, BadRabbit ransomware uses a website to drop a fake Flash update and then drops its payload.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/badrabbit-ransomware-strikes-eastern-europe\/#gallery-20245-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>Countries we know to be impacted so far are Russia, Ukraine, Turkey, Bulgaria, and Germany, with attacks centered on targets as wide-ranging as infrastructure, transportation, and media outlets. It is unknown at this time whether the attack will continue to spread, but it does have the same capacity for lateral infection (the ability to move deeper into a network and gain additional points of control) as the Petya\/Not Petya ransomware.<\/p>\n<p>Below is a view of the pay screen for Bad Rabbit, including its fascinating animated text. This is the most intricate pay screen we&#8217;ve ever seen, although it doesn&#8217;t seem to add any new functionality.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20277 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/BadRabbit_Pay_compressed.gif\" alt=\"\" width=\"1920\" height=\"1080\" \/><\/p>\n<p>Cybercriminals are asking for <a href=\"http:\/\/www.bbc.com\/news\/technology-41740768\" target=\"_blank\" rel=\"noopener\">0.05 bitcoins, or $280,<\/a> in return for the ransomed files. Customers of <a href=\"http:\/\/www.malwarebytes.com\/premium\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Windows<\/a> are already protected from this threat. Malwarebytes detects it as Ransom.BadRabbit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20258\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/MB3_vs_BadRabbit.png\" alt=\"bad rabbit\" width=\"422\" height=\"280\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/MB3_vs_BadRabbit.png 422w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/MB3_vs_BadRabbit-300x199.png 300w\" sizes=\"auto, (max-width: 422px) 100vw, 422px\" \/><\/p>\n<p>Concerned citizens who don&#8217;t have anti-ransomware technology should back up their most important files now (either to the cloud or to an external drive, which should be ejected after the backup is complete to avoid infection). Those who do have this type of security should be sure to run all updates and turn on real-time protection, if not already activated.<\/p>\n<p>Folks looking for a deeper technical dive into BadRabbit stay tuned. We&#8217;ll update this post with a link to our research once it&#8217;s complete.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/badrabbit-ransomware-strikes-eastern-europe\/\">BadRabbit ransomware strikes Eastern Europe<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/badrabbit-ransomware-strikes-eastern-europe\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 24 Oct 2017 21:53:05 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/badrabbit-ransomware-strikes-eastern-europe\/' title='BadRabbit ransomware strikes Eastern Europe'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/badrabbit.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A new strain of malware by the authors of NotPetya called the BadRabbit ransomware is spreading through Eastern Europe, offering a fake Flash update to drop the infection.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bad-rabbit\/\" rel=\"tag\">bad rabbit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/badrabbit\/\" rel=\"tag\">BadRabbit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/not-petya\/\" rel=\"tag\">not petya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/petya\/\" rel=\"tag\">petya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/petya-ransomware\/\" rel=\"tag\">Petya ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/badrabbit-ransomware-strikes-eastern-europe\/' title='BadRabbit ransomware strikes Eastern Europe'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/badrabbit-ransomware-strikes-eastern-europe\/\">BadRabbit ransomware strikes Eastern Europe<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16065,16066,4503,3764,16076,12823,10588,3765],"class_list":["post-10067","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bad-rabbit","tag-badrabbit","tag-cybercrime","tag-malware","tag-not-petya","tag-petya","tag-petya-ransomware","tag-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10067"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10067\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10067"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}