Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

steve2470

(37,461 posts)
Wed Jun 28, 2017, 05:26 PM Jun 2017

Tuesdays massive ransomware outbreak was, in fact, something much worse

https://arstechnica.com/security/2017/06/petya-outbreak-was-a-chaos-sowing-wiper-not-profit-seeking-ransomware/


Code in Tuesday's attack, shown on the left, was altered to permanently destroy hard drives.


QUOTE

Initially, researchers said the malware was a new version of the Petya ransomware that first struck in early 2016. Later, researchers said it was a new, never-before-seen ransomware package that mimicked some of Petya's behaviors. With more time to analyze the malware, researchers on Wednesday are highlighting some curious behavior for a piece of malware that was nearly perfect in almost all other respects: its code is so aggressive that it's impossible for victims to recover their data.

In other words, the researchers said, the payload delivered in Tuesday's outbreak wasn't ransomware at all. Instead, its true objective was to permanently wipe as many hard drives as possible on infected networks, in much the way the Shamoon disk wiper left a wake of destruction in Saudi Arabia. Some researchers have said Shamoon is likely the work of developers sponsored by an as-yet unidentified country. Researchers analyzing Tuesday's malware—alternatively dubbed PetyaWrap, NotPetya, and ExPetr—are speculating the ransom note left behind in Tuesday's attack was, in fact, a hoax intended to capitalize on media interest sparked by last month's massive WCry outbreak.

"The ransomware was a lure for the media," researcher Matt Suiche of Comae Technologies, wrote in a blog post published Wednesday. "This version of Petya actually wipes the first sectors of the disk like we have seen with malwares such as Shamoon." He went on to write: "We believe the ransomware was in fact a lure to control the media narrative, especially after the WannaCry incidents, to attract the attention on some mysterious hacker group rather than a national state attacker like we have seen in the past in cases that involved wipers such as Shamoon."

Suiche provided the above side-by-side code comparison contrasting Tuesday's payload with a Petya version from last year. Both pieces of code take aim at two small files—the master boot record and master file table—that are so crucial that a disk won't function if they are missing or corrupted. But while the earlier Petya encrypts the master boot record and saves the value for later decryption, Tuesday's payload, by contrast, was rewritten to overwrite the master boot record. This means that, even if victims obtain the decryption key, restoring their infected disks is impossible.

UNQUOTE


6 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Tuesdays massive ransomware outbreak was, in fact, something much worse (Original Post) steve2470 Jun 2017 OP
Keep your stuff in the cloud Not Ruth Jun 2017 #1
Yeahhhhh, uhhhhmmmm....No. ret5hd Jun 2017 #4
I'm always interested in the delivery method canetoad Jun 2017 #2
Booby trappede-mails with malicious Office doc attachments Earth Bound Misfit Jun 2017 #6
This is PUTIN, and we are at war. Too bad our White House is on Putin's side. Eliot Rosewater Jun 2017 #3
Thanks... 2naSalit Jun 2017 #5

canetoad

(17,823 posts)
2. I'm always interested in the delivery method
Wed Jun 28, 2017, 05:41 PM
Jun 2017

Of malware outbreaks. Since very few* of us are using the Ukranian accounting software, the last line of the paragraph below reinforces the old rules of online safety. Beware of strange emails and attachments.

https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how

snip/

Where did it start?

The attack appears to have been seeded through a software update mechanism built into an accounting program that companies working with the Ukrainian government need to use, according to the Ukrainian cyber police. This explains why so many Ukrainian organizations were affected, including government, banks, state power utilities and Kiev’s airport and metro system. The radiation monitoring system at Chernobyl was also taken offline, forcing employees to use hand-held counters to measure levels at the former nuclear plant’s exclusion zone. A second wave of infections was spawned by a phishing campaign featuring malware-laden attachments.

Earth Bound Misfit

(3,556 posts)
6. Booby trappede-mails with malicious Office doc attachments
Wed Jun 28, 2017, 07:25 PM
Jun 2017

Lawrence Abrams (aka Grinler) owner/admin @Bleepingcomputer.com posted a "vaccination" for this Petya/not Petya whatever it is:

https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/

Because of the ransomware's global outreach, many researchers flocked to analyze it, hoping to find a loophole in its encryption or a killswitch domain that would stop it from spreading, similar to WannaCry.

While analyzing the ransomware's inner workings, Serper was the first to discover that NotPetya would search for a local file and would exit its encryption routine if that file already existed on disk.

The researcher's initial findings have been later confirmed by other security researchers, such as PT Security, TrustedSec, and Emsisoft.

This means victims can create that file on their PCs, set it to read-only, and block the NotPetya ransomware from executing.

Eliot Rosewater

(32,167 posts)
3. This is PUTIN, and we are at war. Too bad our White House is on Putin's side.
Wed Jun 28, 2017, 05:47 PM
Jun 2017

War is coming, for real.

Beware.

2naSalit

(90,884 posts)
5. Thanks...
Wed Jun 28, 2017, 05:57 PM
Jun 2017

that reminds me I need to download all my stuff to a thumb drive and CD today.

I keep getting massive updates from Microsoft, allegedly, that won't load or run... fortunately. When the error comes up, Microsoft doesn't recognize the error # which tells me there's something wrong with those updates.

Latest Discussions»Help & Search»Computer Help and Support»Tuesdays massive ransomwa...