{"id":19887,"date":"2017-10-24T12:42:49","date_gmt":"2017-10-24T16:42:49","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=19887"},"modified":"2019-11-15T06:44:20","modified_gmt":"2019-11-15T11:44:20","slug":"bad-rabbit-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/bad-rabbit-ransomware\/19887\/","title":{"rendered":"Bad Rabbit: A new ransomware epidemic is on the rise"},"content":{"rendered":"<p><b>The post is being updated as our experts find new details on the malware.<\/b><\/p>\n<p>We\u2019ve already seen two large-scale ransomware attacks this year \u2014 we\u2019re talking about the infamous <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-ransomware\/16518\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WannaCr<\/a>y and <a href=\"https:\/\/www.kaspersky.com\/blog\/new-ransomware-epidemics\/17314\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ExPetr<\/a> (also known as Petya and NotPetya). It seems that a third attack is on the rise: The new malware is called Bad Rabbit \u2014 at least, that\u2019s the name indicated by the darknet website linked in the ransom note.<\/p>\n<p>What is known at the moment is that Bad Rabbit ransomware has infected several big Russian media outlets, with Interfax news agency and Fontanka.ru among the confirmed victims of the malware. Odessa International Airport has reported on a cyberattack on its information system, though whether it\u2019s the same attack is not yet clear.<\/p>\n<p>The criminals behind the Bad Rabbit attack are demanding 0.05 bitcoin as ransom \u2014 that\u2019s roughly $280 at the current exchange rate.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/24124149\/badrabbit_1.gif\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/10\/24124149\/badrabbit_1.gif\" alt=\"\" width=\"720\" height=\"405\" class=\"aligncenter size-full wp-image-19890\"><\/a><\/p>\n<p>According to our findings, it is a drive-by attack: Victims download a fake Adobe Flash installer from infected websites and manually launch the .exe file, thus infecting themselves. Our researchers have detected a number of compromised websites, all news or media sites.<\/p>\n<p>According to our data, most of the victims of these attacks are located in Russia. We have also seen similar but fewer attacks in Ukraine, Turkey, and Germany. This ransomware has infected devices through a number of hacked Russian media websites. Based on our investigation, this is a targeted attack against corporate networks, using methods similar to those used in the ExPetr attack. <\/p>\n<p>Our experts have collected enough evidence to link the Bad Rabbit attack with the <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ExPetr attack<\/a>, which happened in June of this year. According to their analysis, some of the code used in Bad Rabbit was previously spotted in ExPetr.<\/p>\n<p>Other similarities include the same list of domains used for the drive-by attack (some of those domains were hacked back in June but not used) as well as the same techniques used for spreading the malware throughout corporate networks \u2014 both attacks used Windows Management Instrumentation Command-line (WMIC) for that purpose. However, there is a difference: Unlike ExPetr, Bad Rabbit doesn\u2019t use the EternalBlue exploit for the infection. But it uses the EternalRomance exploit to move laterally on the local network.<\/p>\n<p>Our experts think the same threat actor is behind both attacks and that this threat actor was preparing the Bad Rabbit attack by July 2017, or even earlier. However, unlike ExPetr, Bad Rabbit seems to be not a wiper, but just ransomware: It encrypts files of some types and installs a modified bootloader, thus preventing the PC from booting normally. Because it is not a wiper, the malefactors behind it potentially have the ability to decrypt the password, which, in turn, is needed to decrypt files and allow the computer to boot the operating system.<\/p>\n<p>Unfortunately, our experts say that there is no way to get the encrypted files back without knowing the encryption key. However, if for some reason Bad Rabbit didn\u2019t encrypt the whole disk, it is possible to retrieve the files from the shadow copies (if the shadow copies were enabled prior to the infection). We continue our investigation. In the meantime, you can find more technical details in this <a href=\"https:\/\/securelist.com\/bad-rabbit-ransomware\/82851\/\" target=\"_blank\" rel=\"noopener\">post on Securelist<\/a> and learn about ransomware protection more generally <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/ransomware-protection\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>.<\/p>\n<p>Kaspersky Lab\u2019s products detect the attack with the following verdicts:<\/p>\n<ul>\n<li>Trojan-Ransom.Win32.Gen.ftl<\/li>\n<li>Trojan-Ransom.Win32.BadRabbit<\/li>\n<li>DangerousObject.Multi.Generic<\/li>\n<li>PDM:Trojan.Win32.Generic<\/li>\n<li>\nIntrusion.Win.CVE-2017-0147.sa.leak<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<p>To avoid becoming a victim of Bad Rabbit:<\/p>\n<p>Users of Kaspersky Lab products:<\/p>\n<ul>\n<li>Make sure you have System Watcher and Kaspersky Security Network running. If not, it\u2019s essential to turn these features on.<\/li>\n<\/ul>\n<p>Other users:<\/p>\n<ul>\n<li>Block the execution of files c:windowsinfpub.dat and c:Windowscscc.dat.<\/li>\n<li>Disable WMI service (if it\u2019s possible in your environment) to prevent the malware from spreading over your network.<\/li>\n<\/ul>\n<p>Tips for everyone:<\/p>\n<ul>\n<li>Back up your data.<\/li>\n<li>Don\u2019t pay the ransom.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>POST IS BEING UPDATED LIVE. The world is being hit with yet another ransomware epidemic. It\u2019s called Bad Rabbit, and here&#8217;s what we know about it so far.<\/p>\n","protected":false},"author":675,"featured_media":19888,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[2721,2720,2723,2544,1511,420,723,2722],"class_list":{"0":"post-19887","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bad-rabbit","9":"tag-badrabbit","10":"tag-epidemic","11":"tag-outbreak","12":"tag-petya","13":"tag-ransomware","14":"tag-trojans","15":"tag-wiper"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bad-rabbit-ransomware\/19887\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/bad-rabbit-ransomware\/11663\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/bad-rabbit-ransomware\/9747\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/bad-rabbit-ransomware\/5456\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/bad-rabbit-ransomware\/13106\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bad-rabbit-ransomware\/11993\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/bad-rabbit-ransomware\/11628\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bad-rabbit-ransomware\/14652\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bad-rabbit-ransomware\/14391\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bad-rabbit-ransomware\/19072\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bad-rabbit-ransomware\/4326\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/bad-rabbit-ransomware\/9696\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/bad-rabbit-ransomware\/8396\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bad-rabbit-ransomware\/15081\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/bad-rabbit-ransomware\/18518\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bad-rabbit-ransomware\/18986\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bad-rabbit-ransomware\/18974\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19887"}],"version-history":[{"count":14,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19887\/revisions"}],"predecessor-version":[{"id":29892,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19887\/revisions\/29892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19888"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}