Just when you thought it was safe to be on the interwebz, along comes Bad Rabbit!
“Bad Rabbit” is a new pieceÂ of ransomware similar to NotPetya. It is being observed primarily in Russia but also Ukraine and a number of other countries including Bulgaria, Turkey and even some reports in Germany.
This malware is believed to be entering the network through the execution of an installer masquerading itself as an Adobe Flash Installer package.Â As part of the installation process, the malware is provided privileged access by the user, which then allows it to install its payload.
The behaviour is similar to NotPetya (from 26/June/2017) in that it attempts to compromise local passwords which are then used to propogate within the local network usingÂ the “EternalBlue” NSA exploit.
TheÂ Bad Rabbit malware then uses theÂ Mimikatz tool to extract username/password credentials from affected systems.
There are a couple of key things that can be done to avoid infection:
- Do not install media from an unauthorised location. If in doubt, don’t grant access, report it
- Ensure you are patched up-to-date for software products
- Ensure you have the latest anti virus updates installed
- If you suspect an infection of this, or any other malware, report it using existing CERT (security response) processes
One specific action that can be done is to create a new endpoint rule that blocks the execution of the following files
This will only be relevant for early prevention before antivirus updates are available to protect against this new malware.
Anti Virus Definitions
As of 25/Oct/2017 at 08:15 UTC+01:00, all major Anti Virus vendors have provided update definitions which detect Bad Rabbit. Please be sure toÂ positively validate that you have these installed on your servers and endpoints.
There is a growingÂ set of useful information and insights into this malware – you can read about it using the following links: