Remember the last time ransomware exploded out of proportion? Two major international ransomware attacks that took place this year — NotPetya and Wannacry caused widespread disruption, affecting many at large. Now, reports of a new, and worse, ransomware have been discovered affecting computer systems across the European countries, once again showing that cybercriminals with malicious intentions to extort money from victims across the globe. For those who live under a rock, a ransomware is a type of program that locks infected computers and asks victims to pay ransom to restore access. The infamous ‘WannaCry’ ransomware attack in May forced the closure of factories, hospitals, and other facilities around the world for days.
The apparent ransomware worm, dubbed as ‘Bad Rabbit’, bubbled up and began spreading in Russia, Ukraine, and other Eastern European countries. The ransomware is said to be attacking corporate computers, several Russian media outlets, Ukraine’s Odessa airport and Kiev’s subway station as of now, according to a statement released by a Ukrainian government official.
Once a computer is infected, the crooks behind Bad Rabbit lockdown computers and demand 0.05 Bitcoin (about $275) from victims within 41 hours in exchange for decryption of the data and restoring access to their machine. If the time expires, the ransom amount is bumped up. Although researchers believe that Bad Rabbit is somewhat similar to the Petya ransomware, it is still unclear as to who is behind the recent attack.
“Our network devices blocked infection attempts at multiple victims globally until around 2017-10-24 15:00:00 UTC when the infection attempts ceased and attacker infrastructure — both 1dnscontrol.com and monitored sites containing the rogue code — were taken offline. The use of strategic web compromises and profilers provide guardrails that allow attackers to select targets carefully and halt operations quickly,” said FireEye.
“When we say strategic web compromises, this means an attacker hosts malicious code on an unknowing victim’s website that is then used to infect the true targets. The websites are carefully selected for compromise so that they will have the most direct reach to the ultimate targets with minimal collateral damage. In the case of BadRabbit, many strategic compromises were Eastern European travel and media websites used to then profile visitors and deliver the payload,” they added.
We advise our readers to look for suspicious prompts or pop-ups on various websites. It is also advisable to use proper data security solutions such as antivirus software and anti-malware tools....