{"id":17654,"date":"2020-02-06T09:20:58","date_gmt":"2020-02-06T17:20:58","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/02\/06\/news-11389\/"},"modified":"2020-02-06T09:20:58","modified_gmt":"2020-02-06T17:20:58","slug":"news-11389","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/06\/news-11389\/","title":{"rendered":"Living off another land: Ransomware borrows vulnerable driver to remove security software"},"content":{"rendered":"<p><strong>Credit to Author: Andrew Brandt| Date: Thu, 06 Feb 2020 15:22:24 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>Sophos has been investigating two different ransomware attacks where the adversaries deployed a legitimate, digitally signed hardware driver in order to delete security products from the targeted computers just prior to performing the destructive file encryption portion of the attack.<\/p>\n<p>The signed driver, part of a now-deprecated software package published by Taiwan-based motherboard manufacturer Gigabyte, has a known vulnerability, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19320\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-19320<\/a>. The vulnerability, <a href=\"https:\/\/www.secureauth.com\/labs\/advisories\/gigabyte-drivers-elevation-privilege-vulnerabilities\" target=\"_blank\" rel=\"noopener noreferrer\">published along with proof-of-concept code in 2018<\/a> and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore\/\" target=\"_blank\" rel=\"noopener noreferrer\">widely reported at the time<\/a>, was disclaimed by the company, who told the researcher who tried to report the bug that &#8220;its products are not affected by the reported vulnerabilities.&#8221; The company later recanted, and has discontinued using the vulnerable driver, but it still exists, and it apparently remains a threat.<\/p>\n<p>Neither Microsoft nor Verisign, whose code signing mechanism was used to digitally sign the driver, have revoked the signing certificate, so the Authenticode signature remains valid.<\/p>\n<p>In this attack scenario, the criminals have used the Gigabyte driver as a wedge so they could load a second, unsigned driver into Windows. This second driver then goes to great lengths to kill processes and files belonging to endpoint security products, bypassing tamper protection, to enable the ransomware to attack without interference.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-63986 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/robbinhood-ransom-note.png\" alt=\"\" width=\"640\" height=\"558\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/robbinhood-ransom-note.png 1077w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/robbinhood-ransom-note.png?resize=300,262 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/robbinhood-ransom-note.png?resize=768,670 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/robbinhood-ransom-note.png?resize=1024,893 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>This is the first time we have observed ransomware shipping a Microsoft co-signed (yet vulnerable) third party driver to patch the Windows kernel in-memory, load their own unsigned malicious driver, and take out security applications from kernel space. The ransomware that was being installed in both instances calls itself <strong>RobbinHood<\/strong>.<\/p>\n<p>Ransomware trying to circumvent security products is not new. For example, Nemty <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nemty-ransomware-update-lets-it-kill-processes-and-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">kills processes and services<\/a> using regular taskkill, and Snatch ransomware figured out how to <a href=\"https:\/\/news.sophos.com\/en-us\/2019\/12\/09\/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">reboot PCs into Safe Mode<\/a> to get around endpoint protection. Obviously, doing the process killing from kernel mode has a lot of advantages.<\/p>\n<p>This article takes a deep dive on how the attackers do it. We&#8217;re publishing this information now so other defenders can anticipate and enact defenses against this novel attack, where adversaries bring a vulnerable third party driver to subvert the Windows kernel, terminate defenses, and encrypt files unhindered by endpoint protection software.<\/p>\n<h2>Attacking Windows defenses<\/h2>\n<p>We&#8217;ve recently seen the RobbinHood ransomware family perform this strategy to encrypt files without being hindered by endpoint protection software. They successfully subvert a setting in kernel memory on Windows 7, Windows 8 and Windows 10.<\/p>\n<p>Without diving into the ransomware or data encryption itself, we\u2019re going to focus on the module with which the adversaries can kill encountered endpoint protection software. This part of the attack consists of several files embedded in <strong>STEEL.EXE<\/strong>. All of these files are extracted to C:WINDOWSTEMP<\/p>\n<p>&nbsp;<\/p>\n<h3>STEEL.EXE<\/h3>\n<p>The STEEL.EXE application kills the processes and deletes the files of security applications. In order to do this, STEEL.EXE deploys a driver. The driver runs in kernel mode and is therefore optimally positioned to take out processes and files without being hindered by security controls like endpoint protection. Even though they run under NT AUTHORITY\/SYSTEM, most parts of an endpoint security product run in user space.<\/p>\n<p>The STEEL.EXE application first deploys ROBNR.EXE, which installs the malicious unsigned driver RBNL.SYS.<\/p>\n<p>Once this driver is installed, STEEL.EXE reads the PLIST.TXT file and instructs the driver to delete any application listed in PLIST.TXT, then killing their associated processes. If the process was running as a service, the service can no longer automatically restart as the associated file has been deleted.<\/p>\n<p>Once the STEEL.EXE process exits, the ransomware program can perform its encryption attack without being hindered by the security applications that have been taken out decisively.<\/p>\n<h3>ROBNR.EXE<\/h3>\n<p>This application is dropped to the disk by STEEL.EXE. This is a convenient application that drops and installs both the vulnerable GDRV.SYS driver, and the malicious RBNL.SYS driver.<\/p>\n<p>64-bit Windows computers have a mechanism called <em>driver signature enforcement<\/em> which means that Windows only allows drivers to be loaded that have been properly signed by both the manufacturer and Microsoft. This is a requirement for all drivers in order to be loaded on 64-bit versions of Windows.<\/p>\n<p>The malware authors did not bother to sign their malicious driver as it involves purchasing a certificate. Also, a purchased certificate can be revoked by the certificate authority causing the driver to no longer work, as it will no longer be accepted by Windows.<\/p>\n<p>Instead, the malware authors chose a different route. The properly signed third party GDRV.SYS driver contains a privilege escalation vulnerability as it allows reading and writing of arbitrary memory. The malware authors abuse this vulnerability in order to (temporarily) disable driver signature enforcement in Windows \u2013 on-the-fly, in kernel memory. Once driver signature enforcement is disabled, the attackers are able to load their unsigned malicious driver.<\/p>\n<h3>Disabling Driver Signature Enforcement<\/h3>\n<p>The attackers are able to disable driver signature enforcement by changing a single variable (a single byte) that lives in kernel space. On Windows 7 (or older), this variable is called <strong>nt!g_CiEnabled<\/strong> (NTOSKRNL.EXE). On Windows 8 and 10, this variable is called <strong>ci!g_CiOptions<\/strong> (CI.DLL). In order to resolve the location of this variable, the attackers use <a href=\"https:\/\/github.com\/hfiref0x\/DSEFix\/blob\/master\/README.md\" target=\"_blank\" rel=\"noopener noreferrer\">a strategy taken from DSEFix<\/a>.<\/p>\n<p>On Windows 8 or 10, the trick starts by loading the standard Windows component CI.DLL as a data library using <strong>DONT_RESOLVE_DLL_REFERENCES<\/strong> in their process. Once CI.DLL is loaded, they query the location of CI.DLL in kernel memory via the GetModuleBaseByName function. It uses <strong>NtQuerySystemInformation<\/strong>(<em>SystemModuleInformation<\/em> \u2026) to get the kernel addresses of all loaded kernel modules.<\/p>\n<figure id=\"attachment_63984\" aria-describedby=\"caption-attachment-63984\" style=\"width: 640px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63984 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0.png\" alt=\"\" width=\"640\" height=\"1139\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0.png 670w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0.png?resize=169,300 169w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0.png?resize=576,1024 576w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-63984\" class=\"wp-caption-text\">Decompiled: Showing how the variable is found that controls Driver Signing Enforcement.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_63988\" aria-describedby=\"caption-attachment-63988\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63988 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0b.png\" alt=\"\" width=\"640\" height=\"420\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0b.png 764w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_0b.png?resize=300,197 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-63988\" class=\"wp-caption-text\">Decompiled: Showing how to get a module&#8217;s kernel address.<\/figcaption><\/figure>\n<p>Once they know those kernel addresses, the attackers resolve the exported <strong>CiInitialize<\/strong> function from the module&#8217;s <em>export address table<\/em>.Then they disassemble the instructions of that function in order to find the <strong>call CipInitialize()<\/strong> instruction. Once that function is found, they look for the <strong>mov dword ptr [address],ecx<\/strong> instruction. That address is <strong>g_CiOptions<\/strong> as shown in the figure below.<\/p>\n<figure id=\"attachment_63990\" aria-describedby=\"caption-attachment-63990\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63990 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_3.png\" alt=\"\" width=\"640\" height=\"908\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_3.png 840w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_3.png?resize=211,300 211w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_3.png?resize=768,1090 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/ci_3.png?resize=722,1024 722w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-63990\" class=\"wp-caption-text\">Decompiled: Showing how to find the location of g_CiOptions using the HDE disassembler.<\/figcaption><\/figure>\n<p>Now that they know the location of the <strong>g_CiOptions<\/strong> variable in kernel space, the vulnerable third party driver is dropped to disk and started. <a href=\"https:\/\/www.secureauth.com\/labs\/advisories\/gigabyte-drivers-elevation-privilege-vulnerabilities\" target=\"_blank\" rel=\"noopener noreferrer\">See this article on the exact vulnerability<\/a>. Any vulnerable driver that allows arbitrary read\/write in kernel will do. So even though the attackers are using the GDRV.SYS driver to do this today, there&#8217;s no reason they will continue to use it if it becomes untenable to do so.<\/p>\n<p>There are many other vulnerable drivers (with a similar vulnerability) in addition to the Gigabyte driver that these or other attackers may choose to abuse later, such as ones from VirtualBox (CVE-2008-3431), Novell (CVE-2013-3956), CPU-Z (CVE-2017-15302), or ASUS (CVE-2018-18537). But in these attacks, we&#8217;ve only seen the Gigabyte driver being abused in this way.<\/p>\n<figure id=\"attachment_63992\" aria-describedby=\"caption-attachment-63992\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63992 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_5.png\" alt=\"\" width=\"640\" height=\"203\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_5.png 662w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_5.png?resize=300,95 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-63992\" class=\"wp-caption-text\">Decompiled: Showing how the malicious driver is deployed.<\/figcaption><\/figure>\n<h2>The malicious driver<\/h2>\n<p>Once the malicious driver is successfully deployed and started, the ROBNR.EXE process exits. Then STEEL.EXE starts processing the PLIST.TXT file, listing all the applications to kill.<\/p>\n<p>This malicious kernel driver is used to terminate processes and delete the associated files. It employs several tricks to kill these applications, even when they are in-use and protected by tamper protection mechanisms employed by security products.<\/p>\n<figure id=\"attachment_63994\" aria-describedby=\"caption-attachment-63994\" style=\"width: 612px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63994 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_0.png\" alt=\"\" width=\"612\" height=\"558\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_0.png 612w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_0.png?resize=300,274 300w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><figcaption id=\"caption-attachment-63994\" class=\"wp-caption-text\">Decompiled: How the malicious driver starts.<\/figcaption><\/figure>\n<figure id=\"attachment_63996\" aria-describedby=\"caption-attachment-63996\" style=\"width: 561px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63996 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_1.png\" alt=\"\" width=\"561\" height=\"423\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_1.png 561w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_1.png?resize=300,226 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><figcaption id=\"caption-attachment-63996\" class=\"wp-caption-text\">Decompiled: How the malicious driver processes commands (IOCTL) from STEEL.EXE.<\/figcaption><\/figure>\n<p>The following string was found in the malicious driver, indicating it was likely built by the same authors behind the RobbinHood ransomware.<\/p>\n<pre>C:UsersMikhailDesktopRobnholdx64Win7ReleaseRobbnhold.pdb<\/pre>\n<h2>Deleting Files<\/h2>\n<p>The malicious driver has various ways to delete files. But it does not pick one way, it runs them all sequentially, in order to ensure the file really gets deleted.<\/p>\n<p>To delete files that are in-use the malicious driver issues an I\/O Request Packet (or IRP, a <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/gettingstarted\/i-o-request-packets\" target=\"_blank\" rel=\"noopener noreferrer\">low-level message passed between device drivers<\/a>) directly on the NTFS.SYS storage device. By clearing the ImageSectionObject and DataSectionObject pointers, the storage device assumes the files are not in-use and the file is safely deleted, even when the file is still running as a process!<\/p>\n<p>This trick is similar to the technique <a href=\"http:\/\/0tutorials.blogspot.com\/2011\/10\/learn-to-force-delete-running-file.html\" target=\"_blank\" rel=\"noopener noreferrer\">mentioned on this blog post<\/a>.<\/p>\n<figure id=\"attachment_63998\" aria-describedby=\"caption-attachment-63998\" style=\"width: 415px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63998 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_2.png\" alt=\"\" width=\"415\" height=\"229\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_2.png 415w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_2.png?resize=300,166 300w\" sizes=\"auto, (max-width: 415px) 100vw, 415px\" \/><figcaption id=\"caption-attachment-63998\" class=\"wp-caption-text\">Decompiled: The malicious driver uses multiple ways to delete a file.<\/figcaption><\/figure>\n<figure id=\"attachment_64000\" aria-describedby=\"caption-attachment-64000\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-64000 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_3.png\" alt=\"\" width=\"640\" height=\"693\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_3.png 751w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/rbnl_3.png?resize=277,300 277w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-64000\" class=\"wp-caption-text\">Decompiled: How the malicious driver deletes a file that is in-use.<\/figcaption><\/figure>\n<h2>Terminating Processes<\/h2>\n<p>Once the files are deleted, STEEL.EXE kills all the processes associated with the files. Again, it uses its malicious kernel driver to terminate the processes.<\/p>\n<figure id=\"attachment_64001\" aria-describedby=\"caption-attachment-64001\" style=\"width: 627px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-64001 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/terminating.png\" alt=\"\" width=\"627\" height=\"272\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/terminating.png 627w, https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/terminating.png?resize=300,130 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><figcaption id=\"caption-attachment-64001\" class=\"wp-caption-text\">Decompile: How the malicious driver terminates a process.<\/figcaption><\/figure>\n<p>Endpoint protection processes that rely on <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/ddi\/wdm\/ns-wdm-_ob_operation_registration\" target=\"_blank\" rel=\"noopener noreferrer\">object handle filtering<\/a> for their tamper protection cannot prevent a kernel mode termination of processes or deletion of files. The process handles opened by the malicious driver are kernel handles, and kernel handles cannot be filtered. So, the malicious kernel driver can kill these processes without interference of endpoint security controls. One solution is for the endpoint protection process to watch for any process trying to install these vulnerable kernel mode drivers, and prevent the installation from taking place.<\/p>\n<p>If the process was running as a service, the Service Control Manager of Windows will (usually) try to restart the process that just got killed. But it will fail to do so as the related file no longer exists. Consequently, the application is effectively and permanently disabled. The failed attempts to restart the service show up in Event Logs.<\/p>\n<p>When STEEL.EXE has killed all the processes and files in the PLIST.TXT list, it exits. Now the ransomware can encrypt all the files on the system unhindered.<\/p>\n<h2>What users can do to prevent this type of attack<\/h2>\n<p>Computers that are fully patched and have no known vulnerabilities can still end up in ruin because this attacker brings his own vulnerability. So what can you do to prevent the initial access by the attacker?<\/p>\n<p>Adopt a three-pronged approach to minimize your risk of falling victim to an attack.<\/p>\n<h3>1. Threat protection that disrupts the whole attack chain<\/h3>\n<p>Today&#8217;s ransomware attacks use multiple techniques and tactics, so focusing your defense on a single technology leaves you very vulnerable.<br \/> Instead, deploy a range of technologies to disrupt as many stages in the attack as possible. And integrate the public cloud into your security strategy.<\/p>\n<h3>2. Strong security practices<\/h3>\n<p>These include:<\/p>\n<ul>\n<li>Use multi-factor authentication (MFA)<\/li>\n<li>Use complex passwords, managed through a password manager<\/li>\n<li>Limit access rights; give user accounts and admins only the access rights they need<\/li>\n<li>Make regular backups, and keep them offsite and offline where attackers can\u2019t find them<\/li>\n<li>Lock down your RDP; turn it off if you don\u2019t need it, use rate limiting, 2FA or a VPN if you do<\/li>\n<li>Ensure tamper protection is enabled \u2013 other ransomware strains attempt to disable your endpoint protection, and tamper protection is designed to prevent this from happening<\/li>\n<\/ul>\n<h3>3. Ongoing staff education<\/h3>\n<p>People are invariably the weakest link in cybersecurity, and cybercriminals are experts at exploiting normal human behaviors for nefarious gain. Invest \u2013 and keep investing \u2013 in staff training.<\/p>\n<h2>IoCs<\/h2>\n<p>We analyzed the following files in the course of this investigation<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"498\"><strong>SHA256<\/strong><\/td>\n<td width=\"106\"><strong>Filename<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"498\">791c32a95f401f7464214960e49e716656f6fd6fff135ac2a6ba607236d3346e<\/td>\n<td width=\"106\">STEEL.EXE<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">99c3cc348f8ee4e87bce45b1dd185d31830c370ac43fd3e39ac50340f029ef79<\/td>\n<td width=\"106\">ROBNR.EXE<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">0b15b5cc64caf0c6ad9bd759eb35383b1f718edf3d7ab4cd912d0d8c1826edf8<\/td>\n<td width=\"106\">RBNL.SYS<\/td>\n<\/tr>\n<tr>\n<td width=\"498\">31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427<\/td>\n<td width=\"106\">GDRV.SYS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>Acknowledgments<\/h3>\n<p>SophosLabs would like to acknowledge the contributions of Anand Ajjan, Richard Cohen, Sivagnanam Gn, Roland Gyorffi, Erik Loman, Peter Mackenzie, Vikas Singh, Gabor Szappanos, Alex Vermaning and Michael Wood to the analysis for this post.<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/uepwaOU8_Ek\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/02\/robbinhood-ransom-note.png\"\/><\/p>\n<p><strong>Credit to Author: Andrew Brandt| Date: Thu, 06 Feb 2020 15:22:24 +0000<\/strong><\/p>\n<p>Sophos has been investigating two different ransomware attacks where the adversaries deployed a legitimate, digitally signed hardware driver in order to delete security products from the targeted computers just prior to performing the destructive file encryption portion of the attack. The signed driver, part of a now-deprecated software package published by Taiwan-based motherboard manufacturer Gigabyte, [&amp;#8230;]&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/uepwaOU8_Ek&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10383,18513],"class_list":["post-17654","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-sophoslabs","tag-sophoslabs-uncut"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17654"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17654\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17654"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}