BadRabbit: new ransomware attack

Different institutions in five countries are attack by a new ransomware, that demands Bitcoin
25 October 2017   494

A number of institutions of Ukraine, Russian, Bulgaria, Turkey and Japan was attacked by a new version of the cryptographic virus, called Bad Rabbit. 

Apparently, we are facing a new epidemic. The victim of the cryptographic virus became not only the Russian media, but also a number of state institutions and strategic facilities in Ukraine.
 

Group-IB statement

Among the victims of the virus were Russian news agencies Interfax and Fontanka, the Ministry of Infrastructure of Ukraine, the State Aviation Service of Ukraine, the computer system of the Kiev Metro, and the information system of the international airport Odessa. Most likely, the list will be added in the near future.

Hackers ask their victims to follow the link leading to the onion-site, it starts an automatic time counter.

Hacked computer
Hacked computer

Further it demands 0.05 BTC, promising otherwise to destroy all the encrypted information.

Ransom demand
Ransom demand

According to experts of the Group-IB, it is the virus-encryptor, as the victims complain about "blocked screens of computers."

Specialist of the Czech security company ESET Jiří Kropak said that the virus spreads through a fake update file for Adobe Flash. As proof, he posted in his Twitter screenshot from the Russian news site, which offers download such a file. 

Group-IB released 5 facts about the Bad Rabbit.

  1. The analysis of the code established a connection between Bad Rabbit and the cryptographer Not Petya, in June 2017, attacked energy, telecommunications and financial companies in Ukraine.
  2. In Russia there was an attempt to attack banks from the top 20, but they were unsuccessful. Our TDS Polygon system notified users of attempts at infection.
  3. Specialists of Group-IB found that the malicious program was distributed with the help of web traffic from hacked Internet resources, among which were Ukrainian and Russian sites: fontanka.ru, argumenti.ru, argumentiru.com.
  4. Download of malicious software originated from the resource 1dnscontrol.com. Several other resources are associated with it, which can be used to conduct similar attacks, SPAM mailing, phishing.
  5. Kill Switch found: you must create the file C: \ windows \ infpub.dat and set it to read only mode. After that, even if infected, the files will not be encrypted.
     

Group-IB statement

Arizona to Protect Crypto Nodes Legally

According to the public records, proposed protections for cryptocurrency node operators are moving ahead in Arizona's legislature
21 February 2018   44

On February 6 House Bill 2602 was filed by Representative Jeff Weninger (R.-17). It passed the Arizona House of Representatives on February 20 with 55 out of 60 votes. Now it will be sent to the State Senate.

The bill will prevent governments in the state from imposing restrictions on people who run nodes in their residences.

The bill does not specify whether it is restricted to cryptocurrency miners. However, the bill states that individuals using computing power to either validate or encrypt a transaction on a blockchain are protected.

This is just one out several bills making their way through the Arizona legislature. Another bill by Weninger would formally define the terms "coin", "blockchain," and "initial coin offering" within the state's legal framework.

Another bill recently passed by the Arizona Senate which would empower the state government to accept taxes in bitcoin and other cryptocurrencies.