'Bad Rabbit' ransomware found to be similar to NotPetya

Many antivirus tools can't recognise the malware spreading through Russia and Ukraine

A new strain of malware is spreading through organisations in eastern Europe, bearing a striking resemblance to the NotPetya ransomware that targeted users around the world earlier this year.

Dubbed 'Bad Rabbit', it has already hit government departments in Ukraine and Kiev's public transport system, although it has also targeted media outlets and news websites, including news agencies in Russia.

Initial analysis of the ransomware by security researchers yesterday found similarities between Bad Rabbit and the NotPetya ransomware, also known as ExPetr, which was widely considered to have been a state-sponsored variant of the Petya malware.

The Bad Rabbit ransomware uses the fairly common attack vector of fooling users into infecting themselves with malicious files masquerading as something legitimate, in this case an Adobe Flash installer.

Advertisement
Advertisement - Article continues below

The ransomware is able to slowly encrypt a user's files after it is installed, and, just like NotPetya, is able to schedule an automatic reboot of the system, which shuts down the computer.

Users are then presented with a near identical splash screen to that of NotPetya, that directs them to a Tor address where they are asked to pay out 0.05 Bitcoin (around $281) in exchange for a decryption key.

Bad Rabbit's website as seen on Kaspersky's blog

Researchers have already been successful at creating a 'vaccine' to inoculate against the ransomware, which involves creating a custom script that's able to block its ability to encrypt files. As with similar splash screens seen already this year, such as the WannaCry message, a countdown is displayed showing how long a user has left to pay the ransom until it goes up in price.

Both Kaspersky and Malwarebytes have said that the Bad Rabbit ransomware was likely created by the same author.

"Based on our investigation, this is a targeted attack against corporate networks, using methods similar to those used in the ExPetr attack. However, we cannot confirm it is related to ExPetr," said Kaspersky'sAlex Perekalin in a blog post.

"Whether it's possible to get back files encrypted by Bad Rabbit (either by paying the ransom or by using some glitch in the ransomware code) isn't yet known. Kaspersky Lab antivirus experts are investigating the attack, and we will be updating this post with their findings."

It's unclear how far the ransomware has spread, however Kaspersky has confirmed that most targets are thought to be based in Russia, including news agencies Interfax and Fontanka.ru. Similar reports have emerged from Turkey and Germany, although it's too early to tell whether these are victims of this strain of ransomware.

Tony Rowan, chief security consultant at SentinelOne, said this latest strain demonstrates that hackers will continue to reuse old code as long as it proves effective.

"Indications are that this new variant continues to have success. Given that the propagation mechanism is based on EternalBlue [the Windows exploit patched back in March 2017, which both WannaCry and Petya used], it surprises me that so many people haven't patched their systems. Even more, they continue to rely on the legacy AV products which these types of malware evade so easily."

Advertisement
Advertisement - Article continues below

Virus Total, an online tool that analyses the capabilities of antivirus software, found that of 68 programs, almost half failed to correctly identify the file as malicious.

Security researchers continue to monitor the ransomware amid fears of yet another WannaCry and NotPetya style outbreak, attacks that crippled hundreds of thousands of computer networks around the world.

What is Bad Rabbit?

Bad Rabbit is a new strain of ransomware currently targeting eastern Europe and Russia. It's thought to contain similarities to the NotPetya ransomware, including a similar splash screen and encryption methods.

Who has been targeted?

So far two Russian news agencies, Ukraine's Ministry of Infrastructure and Kiev's public transport system are confirmed to have been hit. Odessa international airpot in Ukraine is also reporting issues, although it's unclear whether this is related. Kaspersky reports that the majority of targets are in Russia, although there are also a handful of infections in Turkey and Germany.

How does it spread?

The Bad Rabbit ransomware infects a machine through a malicious install folder, although it requires a user to manually click on a .exe file. So far there's no indication that the ransomware spreads passively.

Can it be stopped?

A quick vaccine has been found to be effective, but requires users to create a custom file that blocks the write permissions of the ransomware. However, once you're infected you have little choice but to pay the ransom or abandon the files.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/security/ransomware/28070/best-ransomware-removal-tools
Security

Best ransomware removal tools

7 Dec 2018
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019