{"id":12526,"date":"2016-07-07T14:07:36","date_gmt":"2016-07-07T18:07:36","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=12526"},"modified":"2019-11-15T06:55:43","modified_gmt":"2019-11-15T11:55:43","slug":"ded-cryptor-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ded-cryptor-ransomware\/12526\/","title":{"rendered":"Ded Cryptor: Greedy ransomware with open-source roots"},"content":{"rendered":"<p>Recently, English- and Russian-speaking people were attacked with a new ransomware Trojan called Ded Cryptor. It\u2019s voracious, demanding a whopping 2 bitcoins (about $1,300) as ransom. Unfortunately, no decryption solution is available to restore files held hostage by Ded Cryptor.<\/p>\n<p>When a computer is infected with Ded Cryptor, the malware changes the system wallpaper to a picture of an evil-looking Santa Claus. A scary image and a ransom demand \u2014 sounds like any other ransomware, right? But Ded Cryptor has a really interesting origin story, kind of a thriller, with good and bad guys battling it out, making mistakes, and facing consequences.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021912\/ded-cryptor-screen-ru.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021912\/ded-cryptor-screen-ru.jpg\" alt=\"Ded Cryptor: Greedy ransomware with open-source roots\" width=\"1280\" height=\"768\" class=\"aligncenter size-full wp-image-12528\"><\/a><\/p>\n<h3>Ransomware for all!<\/h3>\n<p>It all started when <a href=\"https:\/\/twitter.com\/utkusen\" target=\"_blank\" rel=\"noopener nofollow\">Utku Sen<\/a>, a security expert from Turkey, created a piece of ransomware and <a href=\"https:\/\/github.com\/utkusen\/hidden-tear\" target=\"_blank\" rel=\"noopener nofollow\">published the code online<\/a>. Anybody could download it from GitHub, an open and free Web resource that developers use for collaborating on projects (the code was later removed; you\u2019ll see why in a bit).<\/p>\n<p>It was a rather revolutionary idea, making source code freely available to criminals, who would undoubtedly use it to make their own cryptors (and so they did). However, Sen, a white hat hacker, felt certain that every cybersecurity expert needs to understand how cybercriminals think \u2014 and how they code. He believed his unusual approach would help the good guys to oppose the bad guys more efficiently.<\/p>\n<p>An earlier project, the Hidden Tear ransomware project, was also part of Sen\u2019s experiment. From the very beginning, Sen\u2019s work was meant for purposes of education and research. With time, he developed a new type of <a href=\"http:\/\/www.utkusen.com\/blog\/hidden-tear-offline-edition.html\" target=\"_blank\" rel=\"noopener nofollow\">ransomware that could work offline<\/a>. Later, EDA2 \u2014 a more powerful model \u2014 emerged.<\/p>\n<p>EDA2 had better asymmetric encryption than Hidden Tear did. It also could communicate with a full-fledged command-and-control server, and it encrypted the key it transferred there. It also displayed a scary picture to the victim.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021911\/eda2-screenshot.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021911\/eda2-screenshot.jpg\" alt=\"Ded Cryptor: Greedy ransomware with open-source roots\" width=\"600\" height=\"360\" class=\"aligncenter size-full wp-image-12529\"><\/a><\/p>\n<p>EDA2\u2019s source code was also published on GitHub, which brought a lot of attention and criticism to Utku Sen \u2014 and not for nothing. With the source code freely available, wannabe cybercriminals who hadn\u2019t even learned to code properly could use Sen\u2019s open-source ransomware to relieve people of their money. Didn\u2019t he understand that?<\/p>\n<p>He did: Sen had inserted backdoors in his ransomware that enabled him to retrieve decryption keys. That means if he heard about his ransomware being exploited for malicious purposes, he could obtain the command-and-control server\u2019s URL to extract the keys and give them to the victims. There was a problem, however. To decrypt their files, the victims needed to know about the white hat hacker and ask him for the keys. The vast majority of victims had never even heard of Utku Sen.<\/p>\n<h3>You made the ransomware, now pay the ransom!<\/h3>\n<p>Of course, third-party encryptors created with Hidden Tear and EDA2 source code were not long in coming. Sen dealt with the first one more or less successfully: He published the key and waited for victims to find it. But things did not go so well with the second cryptor.<\/p>\n<p>Magic, ransomware that was based on EDA2, looked just like the original and promised to be nothing of interest. When Sen was informed about it, he tried to extract the decryption key as he had done before (through the backdoor) \u2014 but there was no way in. The cybercriminals using Magic had chosen a free host for their command-and-control server. When the hosting provider received complaints regarding the malicious activity, it simply deleted the criminals\u2019 account and all of their files. Any chance of getting the encryption keys disappeared with the data.<\/p>\n<p>The story doesn\u2019t end there. The creators of Magic <a href=\"http:\/\/securityaffairs.co\/wordpress\/43985\/cyber-crime\/no-more-open-source-ransomware.html\" target=\"_blank\" rel=\"noopener nofollow\">reached out to Utku Sen<\/a>, and their conversation developed into a long and public discussion. They began by offering to publish the decryption key if Sen agreed to remove the EDA2 source code from the public domain and pay them 3 bitcoins. In time, both parties agreed to leave ransom out of the deal.<\/p>\n<p>The negotiations turned out to be rather interesting: Readers learned about the hackers\u2019 political motivation \u2014 and that they almost published the key when they heard from a man who lost all photos of his newborn son because of Magic.<\/p>\n<p>In the end, Sen <a href=\"http:\/\/www.utkusen.com\/blog\/project-eda2-is-abandoned-due-to-magic-ransomware-incident.html\" target=\"_blank\" rel=\"noopener nofollow\">removed<\/a> the EDA2 and Hidden Tear source code from GitHub, but he was too late; many people had already downloaded it. On February 2, 2016 Kaspersky Lab expert Jornt van der Wiel <a href=\"https:\/\/securelist.com\/blog\/research\/73565\/hidden-tear-and-its-spin-offs\/\" target=\"_blank\" rel=\"noopener\">noted in an article on SecureList<\/a> that there were 24 encryptors based on Hidden Tear and EDA2 in the wild. Since then the number has only increased.<\/p>\n<h3>How Ded Cryptor emerged <\/h3>\n<p>Ded Cryptor is one of those descendants. It uses EDA2 source code, but its command-and-control server is hosted in Tor for better security and anonymity. The ransomware communicates with the server over the <a href=\"https:\/\/tor2web.org\/\" target=\"_blank\" rel=\"noopener nofollow\">tor2web<\/a> service, which lets programs use Tor without a Tor browser.<\/p>\n<p>In a way, Ded Cryptor, created from various pieces of open code published on GitHub, recalls Frankenstein\u2019s monster. The creators borrowed code for the proxy server from another GitHub developer; and the code for sending requests was initially written by a third developer. An unusual aspect of the ransomware is that it doesn\u2019t send requests to the server directly. Instead, it sets up a proxy server on the infected PC and uses that.<\/p>\n<p>As far as we can tell, the Ded Cryptor developers are Russian speaking. First, the ransom note exists only in English and Russian. Second, Kaspersky Lab senior malware analyst Fedor Sinitsyn analyzed the ransomware code and found the file path C:UserssergeyDesktop<b>\u0434\u043e\u0434\u0435\u043b\u0430\u0442\u044c<\/b>eda2-mastereda2eda2binReleaseOutputTrojanSkan.pdb. (By the way, the aforementioned Magic ransomware was also developed by Russian-speaking people.)<\/p>\n<p>Unfortunately, little is known about how DedCryptor spreads. According to the <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/8657\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Network<\/a>, the EDA2-based ransomware is active mostly in Russia. Next come China, Germany, Vietnam, and India.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021908\/tear-geagraphy.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021908\/tear-geagraphy.jpg\" alt=\"Ded Cryptor: Greedy ransomware with open-source roots\" width=\"1000\" height=\"640\" class=\"aligncenter size-full wp-image-12530\"><\/a><\/p>\n<p>Also unfortunately, there is no available way to decrypt files maimed by Ded Cryptor. Victims can try to <a href=\"https:\/\/technet.microsoft.com\/en-us\/magazine\/2006.01.rapidrecovery.aspx\" target=\"_blank\" rel=\"noopener nofollow\">recover the data from shadow copies<\/a> the operating system may have made. But the best protection is proactive \u2014 it\u2019s much easier to prevent infection than deal with consequences.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<p><a href=\"https:\/\/store.kaspersky.com\/store\/kaspersk\/en_ie\/buy\/productid.320853100\/quantity.1\/currency.usd?cid=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___&amp;affiliate=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___&amp;_ga=1.183770981.2111903088.1454935021\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> detects all Trojans based on Hidden Tear and EDA2 and warns users when it encounters Trojan-Ransom.MSIL.Tear. It also blocks ransomware operations and does not allow them to encrypt files.<\/p>\n<p><a href=\"https:\/\/store.kaspersky.com\/store\/kaspersk\/en_ie\/buy\/productid.320809200\/quantity.1\/currency.usd?cid=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____ktsmd___&amp;affiliate=gl_socmed_pro_ona_smm__onl_b2c_kasperskydaily_lnk____ktsmd___&amp;_ga=1.183770981.2111903088.1454935021\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Total Security<\/a> does all that plus automates backups, which can be useful in all sorts of cases, from ransomware infection to sudden hard-drive death.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ded Cryptor ransomware is based on EDA2 \u2014 an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.<\/p>\n","protected":false},"author":696,"featured_media":12527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[1680,1696,1697,1698,420,723],"class_list":{"0":"post-12526","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cryptors","9":"tag-ded-cryptor","10":"tag-eda2","11":"tag-hidden-tear","12":"tag-ransomware","13":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ded-cryptor-ransomware\/12526\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ded-cryptor-ransomware\/7379\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ded-cryptor-ransomware\/7400\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ded-cryptor-ransomware\/7345\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ded-cryptor-ransomware\/8621\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ded-cryptor-ransomware\/8566\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ded-cryptor-ransomware\/12415\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ded-cryptor-ransomware\/5797\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ded-cryptor-ransomware\/6398\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ded-cryptor-ransomware\/8132\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ded-cryptor-ransomware\/11941\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ded-cryptor-ransomware\/12415\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ded-cryptor-ransomware\/12526\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ded-cryptor-ransomware\/12526\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12526"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12526\/revisions"}],"predecessor-version":[{"id":30225,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12526\/revisions\/30225"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12527"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}