{"id":17489,"date":"2020-01-20T10:52:16","date_gmt":"2020-01-20T18:52:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/20\/news-11224\/"},"modified":"2020-01-20T10:52:16","modified_gmt":"2020-01-20T18:52:16","slug":"news-11224","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/20\/news-11224\/","title":{"rendered":"New paper: Behind the scenes of GandCrab&#8217;s operation"},"content":{"rendered":"<p>Though active for only a little over a year, GandCrab was one of the most successful ransomware operations and caused a great deal of damage worldwide. Running as a Ransomware-as-a-Service scheme, the malware regularly updated itself to newer versions to stay ahead of decryptors released by security researchers, and regularly included taunts, jokes and references to security organizations and researchers in its code.<\/p>\n<p>One security vendor that found itself firmly in GandCrab&#8217;s firing line was South Korea-based <em>AhnLab<\/em>: GandCrab specifically targeted the company and its anti-malware program <em>V3 Lite<\/em>, even revealing a vulnerability in the security program and making attempts to delete it entirely.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/655ece4091ea7e173abe373d456273c6_f4530.png\" alt=\"Figure12-GandCrab.png\" width=\"750\" height=\"244\" \/><span class=\"centered-caption\">AhnLab text string used as a class name in the malware.<\/span><\/p>\n<p>In a new paper (published today in both <a title=\"Behind the scenes of GandCrab\u2019s operation\" href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2020\/01\/behind-scenes-gandcrabs-operation\/\">HTML<\/a> and <a href=\"https:\/\/www.virusbulletin.com\/uploads\/pdf\/magazine\/2020\/202001-GandCrab-operation.pdf\" target=\"_blank\">PDF <\/a>format), the <em>AhnLab<\/em> Security Analysis Team reveal the full details of the battle that went on between GandCrab and <em>AhnLab<\/em>.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><em>For more details of GandCrab, also see the <a title=\"VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in\u00a0depth\" href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2019\/11\/vb2019-paper-different-ways-cook-crab-gandcrab-ransomware-service-raas-analysed-indepth\/\">VB2019 paper<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=mC4raVTmBEY\" target=\"_blank\">presentation <\/a>by McAfee researchers John Fokker and Alexandre Mundo, who looked both at the malware code and its evolution, and at the affiliate scheme behind it.<\/em><\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/01\/new-paper-behind-scenes-gandcrabs-operation\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/655ece4091ea7e173abe373d456273c6_f4530.png\"\/><br \/>                                 The GandCrab ransomware regularly updated itself to newer versions to stay ahead of decryptors released by security researchers, and regularly included taunts, jokes and references to security organizations in its code. In a new paper, the AhnLab Security Analysis Team reveal the full details of the battle that went on between GandCrab and AhnLab.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/01\/new-paper-behind-scenes-gandcrabs-operation\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-17489","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17489"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17489\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17489"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}