{"id":25854,"date":"2019-03-04T08:14:47","date_gmt":"2019-03-04T13:14:47","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=25854"},"modified":"2019-11-15T06:29:03","modified_gmt":"2019-11-15T11:29:03","slug":"gandcrab-ransomware-is-back","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/25854\/","title":{"rendered":"Porn extortion malware GandCrab is back \u2014 and romantic"},"content":{"rendered":"<p>\u201cWe hijacked your webcam and nailed you watching porn. And encrypted your data. And now we want ransom.\u201d You may remember that a somewhat similar <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/extortion-spam\/25070\/\" rel=\"noopener noreferrer nofollow\">blackmail scheme<\/a> saw phenomenal success last year. Well, it seems rumors of the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-for-dummies\/13592\/\" rel=\"noopener noreferrer nofollow\">ransomware<\/a> behind this extortion scam dying are slightly exaggerated.<\/p>\n<p><strong>GandCrab ransomware<\/strong> is back and active as ever. Its developers are constantly launching new versions so as not to lose the hard-won share it currently <a target=\"_blank\" href=\"https:\/\/www.zdnet.com\/article\/bitdefender-releases-third-gandcrab-ransomware-free-decrypter-in-the-past-year\/\" rel=\"noopener noreferrer nofollow\">holds<\/a> \u2014 about 40% of the whole ransomware market. The attackers who rent and propagate GandCrab are also staying current, opting for diversified, creative, and sometimes even romantic tactics to infect victims.<\/p>\n<h2>Ransomware for the sentimental<\/h2>\n<p>Subject lines with declarations of love may sound appealing, but \u201cMy love letter to you,\u201d \u201cFell in love with you,\u201d and \u201cWrote my thoughts down about you\u201d actually herald possible disaster. And around Valentine\u2019s Day, Christmas, New Year\u2019s, or your birthday, or even just on a bleak Monday at work, such a message might not even raise alarms. Like every e-mail, however, this kind is worth careful consideration.<\/p>\n<p>The most common variant of a malicious e-mail making rounds these days has a romantic phrase in the subject line, a heart symbol in the body, and an attachment \u2014 a ZIP file typically called Love_You followed by several digits. If you extract and execute the JavaScript file that is inside, it\u2019ll download GandCrab ransomware.<\/p>\n<p>Then, you\u2019ll be directed to a note explaining that all of the data on your computer has been encrypted, and you can pay the ransom (likely in bitcoins) to get it back. If you don\u2019t know how to deal with cryptocurrencies, the gang that orchestrated the attack kindly provides a live chat window to teach you how to purchase the necessary amount and pay the ransom.<\/p>\n<h3>Ransomware for business<\/h3>\n<p>Back in 2017, a patch was released that fixed a vulnerability in a tool used to synchronize data between two management systems for IT companies. But not everyone installed that patch. In 2019 <a target=\"_blank\" href=\"https:\/\/blog.huntresslabs.com\/cve-2017-18362-arbitrary-sql-injection-in-mangeditsync-integration-ba142ff24f4d\" rel=\"noopener noreferrer nofollow\">GandCrab is targeting those who didn\u2019t<\/a>, encrypting all computers they can reach.<\/p>\n<p>The security flaw enables the malefactors to create new administrator accounts and from there push out commands to install the ransomware on the endpoints that are being managed. In other words, they encrypt the machines of the attacked company\u2019s customers and demand a payoff (always in cryptocurrency).<\/p>\n<h3>Ransomware for responsible alarmists (everyone)<\/h3>\n<p>How many of us would open an e-mail attachment if it said it was an updated emergency exit map for the building where you work? Even if it came from a completely unknown address? Most probably, all of us. In the end, few remember the names of safety managers, anyway.<\/p>\n<p>The attackers started <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beware-of-exit-map-spam-pushing-gandcrab-v51-ransomware\/\" rel=\"noopener noreferrer nofollow\">exploiting that opportunity<\/a>, sending malicious e-mails with a Word file attached. Those who open the document see only the title \u2014 \u201cEmergency exit map\u201d \u2014 and the <em>Enable Content<\/em> button. If you click the button, you\u2019ll install the GandCrab ransomware.<\/p>\n<h3>Ransomware for payers<\/h3>\n<p>Another tactic uses an e-mail that looks like an invoice or a payment confirmation that is available for download from WeTransfer. The link goes to a ZIP or, sometimes, a RAR file, with a password to open it. Guess what\u2019s inside the archive.<\/p>\n<h3>Ransomware for Italians<\/h3>\n<p>Another variant might use a \u201cpayment notice\u201d \u2014 in the form of an Excel file attachment. Try to open it and a file dialog will tell you that you can\u2019t preview it online and suggest that you click <em>Enable edit<\/em> and <em>Enable content<\/em> to see the content.<\/p>\n<p>Curiously, this specific attack <a target=\"_blank\" href=\"https:\/\/www.bromium.com\/gandcrab-ransomware-code-hiding-in-image\/\" rel=\"noopener noreferrer nofollow\">targets Italians exclusively<\/a> (at least, at the moment). By clicking the required buttons, you enable a script that checks whether your computer is based in Italy, relying on the administrative language of the operating system.<\/p>\n<p>If not, nothing special happens. But if you seem to be in Italy, you get to experience the attacker\u2019s sense of humor, in the form of an image of Mario. You know, the one from Super Mario Bros.<\/p>\n<div id=\"attachment_25855\" style=\"width: 213px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/03\/04081029\/mario_b.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-25855\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/03\/04081029\/mario_b.png\" alt=\"This image of Mario contains malicious code that downloads malware\" width=\"203\" height=\"185\" class=\"size-full wp-image-25855\"><\/a><p id=\"caption-attachment-25855\" class=\"wp-caption-text\">This image of Mario contains malicious code that downloads malware<\/p><\/div>\n<p>The image, downloaded when you click to view the file\u2019s contents, contains malicious PowerShell code and starts to download malware. At the moment, researchers disagree on which malware exactly: <a target=\"_blank\" href=\"https:\/\/www.bromium.com\/gandcrab-ransomware-code-hiding-in-image\/\" rel=\"noopener noreferrer nofollow\">GandCrab<\/a>, which encrypts your data, or <a target=\"_blank\" href=\"https:\/\/blog.yoroi.company\/warning\/campagna-di-attacco-fattura-corretta\/\" rel=\"noopener noreferrer nofollow\">Ursnif<\/a>, which <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/mobile-banking-trojans-faq\/13243\/\" rel=\"noopener noreferrer nofollow\">steals<\/a> your banking and online account credentials. Frankly speaking, it makes little difference; the delivery method is the point here, though those also evolve constantly.<\/p>\n<h3>Say no to the greedy crabster<\/h3>\n<p>GandCrab is distributed by many different people \u2014 it is ransomware-as-a-service, developed by a team of malefactors and rented to other crooks, who try to encrypt as many targets as they can. But, despite the differences in delivery methods, just a few best practices can protect you from GandCrab\u2019s greedy claws. Here they are:<\/p>\n<ul>\n<li>When you receive an unexpected e-mail, try to make sure the message is genuine before opening an attachment. For example, give the sender a call.<\/li>\n<li>Always have a reliable and tested backup of all of your key data, so it can be restored in case of an emergency.<\/li>\n<li>Use a good <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">security suite<\/a> to make sure no ransomware can infect your computer.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<p>That should be enough to never encounter GandCrab personally. But if your computer is already encrypted by GandCrab, you can still minimize the damage:<\/p>\n<ul>\n<li>You may be able to get your files back free of charge \u2014 check for the decryption tool on the <a target=\"_blank\" href=\"https:\/\/www.nomoreransom.org\/en\/decryption-tools.html\" rel=\"noopener noreferrer nofollow\">No More Ransom project<\/a> website. Some versions of GandCrab ransomware have flaws that allow decryption. Unfortunately, not all versions can be decrypted.<\/li>\n<li>Before downloading and starting the decryption tool, use a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/internet-security\" rel=\"noopener noreferrer nofollow\">reliable antivirus solution<\/a> to remove the ransomware from your device. Otherwise the malware will repeatedly lock your system or encrypt files.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.<\/p>\n","protected":false},"author":2508,"featured_media":25856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[3106,3153,420],"class_list":{"0":"post-25854","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-extortion","9":"tag-gandcrab","10":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/25854\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/gandcrab-ransomware-is-back\/15352\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/12916\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/17290\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gandcrab-ransomware-is-back\/15445\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/14146\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/gandcrab-ransomware-is-back\/17959\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/gandcrab-ransomware-is-back\/16991\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/gandcrab-ransomware-is-back\/22502\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/gandcrab-ransomware-is-back\/5757\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/gandcrab-ransomware-is-back\/11467\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/gandcrab-ransomware-is-back\/11547\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/gandcrab-ransomware-is-back\/10433\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/gandcrab-ransomware-is-back\/18666\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/gandcrab-ransomware-is-back\/22722\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/gandcrab-ransomware-is-back\/23944\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/gandcrab-ransomware-is-back\/18181\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gandcrab-ransomware-is-back\/22225\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gandcrab-ransomware-is-back\/22158\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2508"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25854"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25854\/revisions"}],"predecessor-version":[{"id":29512,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25854\/revisions\/29512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25856"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}