BadRabbit: new ransomware attack

Different institutions in five countries are attack by a new ransomware, that demands Bitcoin
25 October 2017   1840

A number of institutions of Ukraine, Russian, Bulgaria, Turkey and Japan was attacked by a new version of the cryptographic virus, called Bad Rabbit. 

Apparently, we are facing a new epidemic. The victim of the cryptographic virus became not only the Russian media, but also a number of state institutions and strategic facilities in Ukraine.
 

Group-IB statement

Among the victims of the virus were Russian news agencies Interfax and Fontanka, the Ministry of Infrastructure of Ukraine, the State Aviation Service of Ukraine, the computer system of the Kiev Metro, and the information system of the international airport Odessa. Most likely, the list will be added in the near future.

Hackers ask their victims to follow the link leading to the onion-site, it starts an automatic time counter.

Hacked computer
Hacked computer

Further it demands 0.05 BTC, promising otherwise to destroy all the encrypted information.

Ransom demand
Ransom demand

According to experts of the Group-IB, it is the virus-encryptor, as the victims complain about "blocked screens of computers."

Specialist of the Czech security company ESET Jiří Kropak said that the virus spreads through a fake update file for Adobe Flash. As proof, he posted in his Twitter screenshot from the Russian news site, which offers download such a file. 

Group-IB released 5 facts about the Bad Rabbit.

  1. The analysis of the code established a connection between Bad Rabbit and the cryptographer Not Petya, in June 2017, attacked energy, telecommunications and financial companies in Ukraine.
  2. In Russia there was an attempt to attack banks from the top 20, but they were unsuccessful. Our TDS Polygon system notified users of attempts at infection.
  3. Specialists of Group-IB found that the malicious program was distributed with the help of web traffic from hacked Internet resources, among which were Ukrainian and Russian sites: fontanka.ru, argumenti.ru, argumentiru.com.
  4. Download of malicious software originated from the resource 1dnscontrol.com. Several other resources are associated with it, which can be used to conduct similar attacks, SPAM mailing, phishing.
  5. Kill Switch found: you must create the file C: \ windows \ infpub.dat and set it to read only mode. After that, even if infected, the files will not be encrypted.
     

Group-IB statement

Lightning Desktop App to be Launched in BTC Mainnet

The application, which is based on the lightweight Neutrino client, is available for the macOS, Windows and Linux, however, it's oriented fro test environment
24 April 2019   121

Lightning Labs, a leading developer of solutions for the Lightning Network, announced the launch of its desktop wallet in the main Bitcoin network. An application that was previously tested in a test network is available in the alpha version.

The application, which is based on the lightweight Neutrino client, is available for the operating systems macOS, Windows and Linux, however, as the developers emphasize, is still oriented primarily to the test environment. At the same time, more advanced users can also experiment with the wallet interface and get access to their funds.

Lightning App Desktop Version Screenshot
Lightning App Desktop Version Screenshot

The Neutrino client allows non-custodial Lightning wallets to verify Bitcoin transactions without the need to synchronize with the full version of the blockchain.

The new release includes such a function as displaying a single balance, which will allow users to see the cumulative number of coins both in the network base and in the payment channels by percentage.