Bad Rabbit Ransomware Highlights Perils of Poor Network Management

Companies in Russia and Eastern Europe have been battling a new ransomware outbreak since Tuesday that security researchers have dubbed Bad Rabbit. The malware can spread to Windows systems over local networks by using weak or stolen credentials for SM… Continue reading Bad Rabbit Ransomware Highlights Perils of Poor Network Management

Infrastructure for the ‘Bad Rabbit’ Ransomware Appears to Have Shut Down

Most of the servers and sites used by the hackers behind the ransomware are down just a day after the outbreak started. Continue reading Infrastructure for the ‘Bad Rabbit’ Ransomware Appears to Have Shut Down

Comparing EternalPetya and BadRabbit

I’ve created a table comparing the EternalPetya (ExPetr, NotPetya, etc.) outbreak from June, and the BadRabbit ransomware outbreak from yesterday (2017-10-24).
I have decided to not include WannaCry (WanaCrypt0r), as they are not related, while Eternal… Continue reading Comparing EternalPetya and BadRabbit

BadRabbit: a closer look at the new version of Petya/NotPetya

BadRabbit, a new version of NotPetya, also has an infector allowing for lateral movements. However, unlike NotPetya, it does not use EternalBlue and uses a website to drop its payload. We take a closer look at this new ransomware variant.
Categor… Continue reading BadRabbit: a closer look at the new version of Petya/NotPetya

BadRabbit: a closer look at the new version of Petya/NotPetya

BadRabbit, a new version of NotPetya, also has an infector allowing for lateral movements. However, unlike NotPetya, it does not use EternalBlue and uses a website to drop its payload. We take a closer look at this new ransomware variant.
Categor… Continue reading BadRabbit: a closer look at the new version of Petya/NotPetya

‘BadRabbit’ ransomware spreading across Ukraine, Russia

Multiple Russian and Ukrainian organizations were hit with a ransomware attack Tuesday, causing disruptions across a number of different transportation hubs, including a major airport and transit system in Kiev, Ukraine and several Russian media organizations. The malware, dubbed “BadRabbit” by security researchers, will load a message in red text over a black background on infected computers, requesting payment from victims in order to unlock their systems. The price to unlock an infected system increases over time, the message reads, and requires victims to log into a Tor hidden service website to send bitcoin. This display carries certain similarities with another ransomware outbreak known as NotPetya, which spread across Ukraine in June and into a variety of multinational corporations with connections to the country’s economy. Other overlaps also exist between NotPetya and BadRabbit, including the reuse of Diskcoder.D, a trojan that encrypts files on local drives, researchers say. #badrabbit found […]

The post ‘BadRabbit’ ransomware spreading across Ukraine, Russia appeared first on Cyberscoop.

Continue reading ‘BadRabbit’ ransomware spreading across Ukraine, Russia

Europol: Ransomware is far and away criminals’ favorite attack method

For police tracking the cybercrime horse race, it’s clear that ransomware is pulling away. While security incidents of all types continue at breakneck pace, a new report from the European Union’s law enforcement organization Europol pointed to ransomware as one of the easiest, most effective and common threats seen across the world. “Ransomware has eclipsed most other cyberthreats with global campaigns indiscriminately affecting victims across multiple industries in both the public and private sectors,” Europol’s researchers wrote in the newly published 2017 Internet Organised Crime Threat Assessment (IOCTA). “Some attacks have targeted and affected critical national infrastructures at levels that could endanger lives. These attacks have highlighted how connectivity, poor digital hygiene standards and security practices can allow such a threat to quickly spread and expand the attack vector.” The IOCTA, designed to provide guidance and recommendations to law enforcement and governments across the continent, tracked ransomware attacks in the last year and […]

The post Europol: Ransomware is far and away criminals’ favorite attack method appeared first on Cyberscoop.

Continue reading Europol: Ransomware is far and away criminals’ favorite attack method

FedEx attributes $300 million loss to NotPetya ransomware attack

FedEx reported an estimated $300 million loss in its first quarter earnings report Tuesday, attributing the loss mostly to a computer virus that impacted the company’s operations across Europe in July. The package delivery company’s Dutch subsidiary, TNT Express, was infected with the NotPetya ransomware virus in late June. NotPetya hit companies in Ukraine in late June and soon spread to other countries. Much of TNT Express’s operations are based in Ukraine. The attack froze users’ computers, encrypted their files and demanded a ransom of $300 in Bitcoin to regain access.  Cybersecurity researchers found, however, that regardless of whether a victim paid the ransom for NotPetya, data on infected computers may be deleted. The earnings report released Tuesday by FedEx notes that most of TNT’s services resumed after the attack and “substantially all” its critical operational systems are back up and running, but volume, revenue and profits were  negatively impacted. […]

The post FedEx attributes $300 million loss to NotPetya ransomware attack appeared first on Cyberscoop.

Continue reading FedEx attributes $300 million loss to NotPetya ransomware attack