How does the Bad Rabbit ransomware compare to other recent ransomware variants? Are there any weaknesses in Bad...
Rabbit that can enable users to recover data?
As operating systems and antimalware tools begin to include protection against ransomware, ransomware itself has evolved by including standard encryption software, such as the open source DiskCryptor. The Bad Rabbit ransomware has incorporated these improvements to make it more effective and dangerous.
Both FireEye and Kaspersky have investigated Bad Rabbit ransomware, as it is similar to the NotPetya ransomware, also known as ExPetr or EternalPetya.
Along with the standard ransomware functionality, some of the similarities between Bad Rabbit and NotPetya include checking for a specific file before infecting a system, checking the running processes on the local system looking for antimalware utilities, and performing antiforensic steps to make the investigation of an incident more difficult. Likewise, both malware authors used the same code base and reused part of the code that previously worked effectively.
On the other hand, Bad Rabbit has an additional command-line argument that can skip the credential theft and lateral movement attack aspects, but it does not include the PsExec utility bundle. These differences could have been implemented to reduce the chance of being detected, as dumping credentials and scanning systems on the network are key indicators of compromise.
Kaspersky reported that there is one potential option to recover an endpoint infected with Bad Rabbit malware, as it doesn't delete shadow copies. Therefore, if shadow copies are enabled on the endpoint, then they could be used to recover data without paying the ransom.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
The Zealot campaign discovered by F5 Networks uses the same Apache Struts vulnerability exploited in the Equifax breach. Learn how else it performs ... Continue Reading
Facebook Messenger is being used to reach more victims with a cryptojacking bot that Trend Micro researchers named Digimine. Learn how this bot works... Continue Reading
Spider ransomware has been found spreading malicious files via a phishing campaign that gives victims a 96-hour deadline. Learn how this attack is ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.