BadRabbit: new ransomware attack

Different institutions in five countries are attack by a new ransomware, that demands Bitcoin
25 October 2017   2849

A number of institutions of Ukraine, Russian, Bulgaria, Turkey and Japan was attacked by a new version of the cryptographic virus, called Bad Rabbit. 

Apparently, we are facing a new epidemic. The victim of the cryptographic virus became not only the Russian media, but also a number of state institutions and strategic facilities in Ukraine.
 

Group-IB statement

Among the victims of the virus were Russian news agencies Interfax and Fontanka, the Ministry of Infrastructure of Ukraine, the State Aviation Service of Ukraine, the computer system of the Kiev Metro, and the information system of the international airport Odessa. Most likely, the list will be added in the near future.

Hackers ask their victims to follow the link leading to the onion-site, it starts an automatic time counter.

Hacked computer
Hacked computer

Further it demands 0.05 BTC, promising otherwise to destroy all the encrypted information.

Ransom demand
Ransom demand

According to experts of the Group-IB, it is the virus-encryptor, as the victims complain about "blocked screens of computers."

Specialist of the Czech security company ESET Jiří Kropak said that the virus spreads through a fake update file for Adobe Flash. As proof, he posted in his Twitter screenshot from the Russian news site, which offers download such a file. 

Group-IB released 5 facts about the Bad Rabbit.

  1. The analysis of the code established a connection between Bad Rabbit and the cryptographer Not Petya, in June 2017, attacked energy, telecommunications and financial companies in Ukraine.
  2. In Russia there was an attempt to attack banks from the top 20, but they were unsuccessful. Our TDS Polygon system notified users of attempts at infection.
  3. Specialists of Group-IB found that the malicious program was distributed with the help of web traffic from hacked Internet resources, among which were Ukrainian and Russian sites: fontanka.ru, argumenti.ru, argumentiru.com.
  4. Download of malicious software originated from the resource 1dnscontrol.com. Several other resources are associated with it, which can be used to conduct similar attacks, SPAM mailing, phishing.
  5. Kill Switch found: you must create the file C: \ windows \ infpub.dat and set it to read only mode. After that, even if infected, the files will not be encrypted.
     

Group-IB statement

PBoC to Continue Anti-Crypto Propaganda

The regulator published a warning in its WeChat account called “Protection of the rights and interests of consumers of financial services”
23 March 2020   319

The People's Bank of China has returned to criticism of cryptocurrencies amid a worsening economic situation in the world.

On March 22, the regulator published a large-scale warning in its WeChat account under the heading “Protection of the rights and interests of consumers of financial services”. It describes three ways in which cryptocurrency service providers can mislead consumers.

First of all, the amount of fraud transactions with bots is serious. The average turnover rate of the top three overseas crypto currency exchanges is much higher than that of foreign licensed exchanges. Second, market manipulation exists in these exchanges where forced leveraged trading eventually causes the exchanges to explode. Third, money laundering is a big issue.

 

People's Bank of China

In addition, the Chinese Central Bank calls the opinion that Bitcoin may serve as a protective asset, erroneous. The regulator indicates its high volatility and recommends that citizens not follow the example of other investors and refuse to participate in cryptocurrency trading.