How does the Bad Rabbit ransomware compare to other recent ransomware variants? Are there any weaknesses in Bad...
Rabbit that can enable users to recover data?
As operating systems and antimalware tools begin to include protection against ransomware, ransomware itself has evolved by including standard encryption software, such as the open source DiskCryptor. The Bad Rabbit ransomware has incorporated these improvements to make it more effective and dangerous.
Along with the standard ransomware functionality, some of the similarities between Bad Rabbit and NotPetya include checking for a specific file before infecting a system, checking the running processes on the local system looking for antimalware utilities, and performing antiforensic steps to make the investigation of an incident more difficult. Likewise, both malware authors used the same code base and reused part of the code that previously worked effectively.
On the other hand, Bad Rabbit has an additional command-line argument that can skip the credential theft and lateral movement attack aspects, but it does not include the PsExec utility bundle. These differences could have been implemented to reduce the chance of being detected, as dumping credentials and scanning systems on the network are key indicators of compromise.
Kaspersky reported that there is one potential option to recover an endpoint infected with Bad Rabbit malware, as it doesn't delete shadow copies. Therefore, if shadow copies are enabled on the endpoint, then they could be used to recover data without paying the ransom.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.