{"id":10145,"date":"2017-10-27T09:00:03","date_gmt":"2017-10-27T17:00:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/27\/news-3918\/"},"modified":"2017-10-27T09:00:03","modified_gmt":"2017-10-27T17:00:03","slug":"news-3918","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/27\/news-3918\/","title":{"rendered":"Bad Rabbit Ransomware \u2013 What is it and how to stay safe"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 27 Oct 2017 16:50:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Trend Micro is tracking multiple reports of ransomware infections, known as Bad Rabbit, in many countries around the world. A suspected variant of <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/frequently-asked-questions-the-petya-ransomware-outbreak\">Petya<\/a>, Bad Rabbit is\u00a0<a href=\"https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1099580.aspx?vwd=KB-_-prd=gen-_-src=KB1118640-_-loc=Default\">ransomware<\/a>\u2014malicious software that infects a computer and restricts user access to the infected machine until a ransom is paid to unlock it. We want to assure you that the latest version of Trend Micro Security provides effective protection against this ransomware attack.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What is BadRabbit and how does it work?<\/strong><\/p>\n<p>BadRabbit spreads via fake Adobe Flash updates, tricking users into clicking the malware by falsely alerting the user that their Flash player requires an update. BadRabbit incorporates the use of Mimikatz to extract credentials (an open source tool that has been used in previous attacks) to extract common hard-coded credentials such as Admin, Guest, User, root, etc. There is also evidence that BadRabbit ransomware is using a legitimate tool \u2014 DiskCryptor \u2014 to encrypt the victim&#8217;s data.<\/p>\n<p>Once the victim\u2019s PC is infected and their data encrypted, BadRabbit reboots the system and the following message is displayed after reboot:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-540080\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1.jpg\" alt=\"\" width=\"599\" height=\"376\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1.jpg 808w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1-300x188.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1-768x482.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1-640x402.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1-440x276.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/bad-rabbit-3-1-380x238.jpg 380w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>Based on our initial analysis, Bad Rabbit spreads to other computers by dropping copies of itself over the network.<\/p>\n<p>Trend Micro Security customers can take to ensure\u00a0 they\u2019re protected from BadRabbit:<\/p>\n<p>1. Make sure you are using the latest version of Trend Micro Security. You can\u00a0<a href=\"https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1053723.aspx?vwd=KB-_-prd=gen-_-src=KB1118640-_-loc=Default\">check here if you already have the latest version<\/a>\u00a0or follow instructions here to\u00a0<a href=\"https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1059569.aspx?vwd=KB-_-prd=gen-_-src=KB1118640-_-loc=Default\">upgrade Trend Micro Security to the latest version<\/a>. Upgrades to the latest version of Trend Micro Security are free.<\/p>\n<p>Read:\u00a0<a href=\"https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1099580.aspx?vwd=KB-_-prd=gen-_-src=KB1118640-_-loc=Default\">How Can Trend Micro Security protect me from Ransomware?<\/a><\/p>\n<p>2. Make sure your Trend Micro Security has the latest Security and Program updates. You can\u00a0<a href=\"https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1105080.aspx?vwd=KB-_-prd=gen-_-src=KB1118640-_-loc=Default\">check here to manually update your Trend Micro Security<\/a>.<\/p>\n<p><strong>Trend Micro Security<\/strong><\/p>\n<p>Trend Micro Security provides online protection against malware and ransomware using advanced machine learning- based technology. so you can enjoy your digital life safely. It helps protect you from identity theft, viruses, phishing, online scams, and more.<\/p>\n<p>Trend Micro Security keeps your valuable files safe from ransomware with Folder Shield, by allowing only authorized applications to access the protected folders such as your documents, photos, music, and videos. Folder Shield can even protect cloud- synced folders such as Dropbox, Google Drive, and Microsoft OneDrive.<\/p>\n<p>Learn more at <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome.html\">trendmicro.com<\/a><\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/bad-rabbit-ransomware-stay-safe\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 27 Oct 2017 16:50:50 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/security-news-hacking-data.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Trend Micro is tracking multiple reports of ransomware infections, known as Bad Rabbit, in many countries around the world. A suspected variant of Petya, Bad Rabbit is\u00a0ransomware\u2014malicious software that infects a computer and restricts user access to the infected machine until a ransom is paid to unlock it. We want to assure you that the&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,3765,714],"class_list":["post-10145","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-ransomware","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10145"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10145\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10145"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}