Bad Rabbit Relies on Social Engineering, Not Exploits

Sivan Nir/strong>Oct 25, 2017

Yesterday, researchers at Kaspersky observed notifications of a large–scale attack for the ransomware dubbed “Bad Rabbit.” Similar to Pety'

]a (a.k.a. NotPetya, ExPetr), the attack is bringing back bad and all–too–recent memories of global ransomware outbreaks. Bad Rabbit shares 67 percent of its code with Petya, which suggests the authors behind the attack are the same, or at least have bought (or stolen) the code from the original authors.

At the time of this post, attacks have been observed mostly in Russia and Eastern Europe, as well as Turkey, Germany and the U.S. The Russian targets are raising eyebrows as, traditionally, the Russian attack groups tend to avoid targeting the “motherland,” indicating this is unlikely to be a Russian threat actor. This would set it apart from the Petya outbreak in June of 2017, which some researchers speculated was a state–sponsored attack against Ukraine (i.e., by the Russians) masquerading as a global, distributed ransomware attack.

It’s not yet clear who’s behind Bad Rabbit (and Petya/NotPetya still has no known attribution), but consumers as well as businesses and critical infrastructure have been affected, including Kiev’s metro and Odessa Airport.

  • Bad Rabbit Uses Social Engineering to Infect

The infection vector starts by visiting a compromised website requesting an Adobe Flash update that downloads the malware. These are legitimate sites that have been hacked (see — but don’t visit — the list of compromised websites below).

Bad Rabbit doesn’t appear to be indiscriminately infecting targets; the server–side logic can determine if the visitor is of interest and then content is added to the page.

The infection is based solely on social engineering, needing the user to download and install the malware. Downloading the fake Adobe Flash update instead downloads and installs the malicious payload without exploiting any vulnerability.

Upon execution, it encrypts the files, installs its own bootloader in the master boot record (MBR) and schedules a reboot. After the system reboots, it displays the ransom note to the user, and the entire OS does not boot. This means that there is no access to the files via a different OS/system.

  • Lateral Movement Enables Spread of Ransomware

Bad Rabbit has lateral movement capabilities via the SMB protocol (the notorious ports 445 and 139), which may be how it’s reached as far as the U.S.

Unlike Petya/NotPetya and WannaCry, Bad Rabbit doesn’t use the EternalBlue exploits. Bad Rabbit spreads with the help of a Mimikatz–based module, extracting locally stored credentials. In addition, a brute force attack is used for spreading via commonly used usernames and passwords (hard–coded list).

It seems this ransomware is affecting only Windows users, and that the encrypted data is recoverable. So unlike Petya/NotPetya, it does seem we’re dealing with an actual ransomware and not a destroyer. The current payment demanded for decrypting files if 0.05 Bitcoins — around $285.

  • How to Stay Safe from Bad Rabbit

Organizations should prevent access to the known compromised websites through blacklisting and limit the use of the SMB protocol.

As Bad Rabbit doesn’t use vulnerabilities/exploits, patching does not apply.

Users should block the execution of file “c: \ windows \ infpub.dat, C: \ Windows \ cscc.dat.” in order to prevent infection.

Other cyber hygiene practices are also useful, including the use of strong passwords and limiting admin privileges only to necessary users.

List of Compromised Sites Delivering Bad Rabbit

  • Argumentiru[.]com
  • fontanka[.]ru
  • grupovo[.]bg
  • sinematurk[.]com
  • spbvoditel[.]ru
  • argumenti[.]ru
  • mediaport[.]ua
  • fontanka[.]ru
  • an-crimea[.]ru
  • t.ks[.]ua
  • most-dnepr[.]info
  • com[.]ua
  • otbrana[.]com
  • fontanka[.]ru
  • grupovo[.]bg
  • pensionhotel[.]cz
  • online812[.]ru
  • imer[.]ro
  • spb[.]ru
  • com[.]ua
  • pensionhotel[.]com
  • ankerch-crimea[.]ru

    Bad Rabbit Authors Fans of GOT?

    One lighthearted anecdote in this headache of infection: the threat group behind Bad Rabbit appear to be fans of Game of Thrones. The code contains references to the dragons in the show — Viserion, Drogon and Rhaegal. So, dragons eat bad rabbits…?

    Related Posts

    Petya Ransomware Attack — What We Know So Far: Petya (or NotPetya) spread quickly across Europe and the US, affecting business, government agencies and critical infrastructure

    Petya NotPetya? Ransomware NotRansomware? A day after the Petya attack outbreak, we’re left with a plenty of questions and a bit more insight.

    Sivan Nir is a senior analyst in the Skybox Research Lab, a team of dedicated vulnerability researchers who aggregate and analyze vulnerability data from more than 30 public and private vulnerability data sources. Sivan has more than 10 years’ experience  in business intelligence data analysis. Sivan holds an MBA and a bachelor’s degree in Biotechnology Engineering.

    Recent Posts

    What’s new in the Skybox Security version 11.5 release
    Read More
    Cryptomining is hottest new malware type, research reveals
    Read More
    Three ways to modernize your OT security programs
    Read More
    How to manage third-party cyber risk in banking and financial services
    Read More
    Vulnerability and Threat Trends Report highlights the importance of cyber exposure analysis that goes beyond CVSS rating
    Read More
    Skybox 2021 Vulnerability and Threat Trends mid-year report
    Read More