{"id":10062,"date":"2017-10-24T09:30:10","date_gmt":"2017-10-24T17:30:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/24\/news-3835\/"},"modified":"2017-10-24T09:30:10","modified_gmt":"2017-10-24T17:30:10","slug":"news-3835","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/10\/24\/news-3835\/","title":{"rendered":"Bad Rabbit: A new ransomware epidemic is on the rise"},"content":{"rendered":"<p><strong>Credit to Author: Alex Perekalin| Date: Tue, 24 Oct 2017 16:42:49 +0000<\/strong><\/p>\n<p><b>The post is being updated as our experts find new details on the malware.<\/b><\/p>\n<p>We&#8217;ve already seen two large-scale ransomware attacks this year \u2014 we&#8217;re talking about the infamous <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-ransomware\/16518\/\" target=\"_blank\">WannaCr<\/a>y and <a href=\"https:\/\/www.kaspersky.com\/blog\/new-ransomware-epidemics\/17314\/\" target=\"_blank\">ExPetr<\/a> (also known as Petya and NotPetya). It seems that a third attack is on the rise: The new malware is called Bad Rabbit \u2014 at least, that&#8217;s the name indicated by the darknet website linked in the ransom note.<\/p>\n<p> <a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/10\/24123908\/bad-rabbit-ransomware-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/10\/24123908\/bad-rabbit-ransomware-featured.jpg\" alt=\"badrabbit ransomware\" width=\"1460\" height=\"960\" class=\"aligncenter size-full wp-image-19888\" \/><\/a> <\/p>\n<p>What is known at the moment is that Bad Rabbit ransomware has infected several big Russian media outlets, with Interfax news agency and Fontanka.ru among the confirmed victims of the malware. Odessa International Airport has reported on a cyberattack on its information system, though whether it&#8217;s the same attack is not yet clear.<\/p>\n<p>The criminals behind the Bad Rabbit attack are demanding 0.05 bitcoin as ransom \u2014 that&#8217;s roughly $280 at the current exchange rate.<\/p>\n<p> <a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/10\/24124149\/badrabbit_1.gif\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/10\/24124149\/badrabbit_1.gif\" alt=\"\" width=\"720\" height=\"405\" class=\"aligncenter size-full wp-image-19890\" \/><\/a> <\/p>\n<p>Details of the attack and its mechanism of spreading are still to be investigated, and whether it&#8217;s possible to get back files encrypted by Bad Rabbit (either by paying the ransom or by using some glitch in the ransomware code) isn&#8217;t yet known. Kaspersky Lab antivirus experts are investigating the attack, and we will be updating this post with their findings.<\/p>\n<p>According to our data, most of the victims of these attacks are located in Russia. We have also seen similar but fewer attacks in Ukraine, Turkey, and Germany. This ransomware has infected devices through a number of hacked Russian media websites. Based on our investigation, this is a targeted attack against corporate networks, using methods similar to those used in the ExPetr attack. However, we cannot confirm it is related to ExPetr. We continue our investigation.<\/p>\n<p>Kaspersky Lab&#8217;s products detect the attack with the following verdicts: UDS:DangerousObject.Multi.Generic (detected by Kaspersky Security Network), PDM:Trojan.Win32.Generic (detected by System Watcher) and Trojan-Ransom.Win32.Gen.ftl.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\" \/> <\/p>\n<p>To avoid becoming a victim of Bad Rabbit:<\/p>\n<p>Users of Kaspersky Lab products:<\/p>\n<ul>\n<li>Make sure you have System Watcher and Kaspersky Security Network running. If not, it&#8217;s essential to turn these features on.<\/li>\n<\/ul>\n<p>Other users:<\/p>\n<ul>\n<li>Block the execution of files c:windowsinfpub.dat and c:Windowscscc.dat.<\/li>\n<li>Disable WMI service (if it&#8217;s possible in your environment) to prevent the malware from spreading over your network.<\/li>\n<\/ul>\n<p>Tips for everyone:<\/p>\n<ul>\n<li>Back up your data.<\/li>\n<li>Don&#8217;t pay the ransom.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kart\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/bad-rabbit-ransomware\/19887\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Alex Perekalin| Date: Tue, 24 Oct 2017 16:42:49 +0000<\/strong><\/p>\n<p>POST IS BEING UPDATED LIVE. The world is being hit with yet another ransomware epidemic. It\u2019s called Bad Rabbit, and here&#8217;s what we know about it so far.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[16065,16066,16067,12288,12823,3765,10438,10833,16068],"class_list":["post-10062","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-bad-rabbit","tag-badrabbit","tag-epidemic","tag-outbreak","tag-petya","tag-ransomware","tag-threats","tag-trojan","tag-wiper"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10062"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10062\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}