The Asian Age

Mamba: Ransomware behind railway hack is back online

The group behind Mamba has resumed its attacks, targeting corporatio­ns mainly in countries such as Brazil and Saudi Arabia

-

In late November 2016, a huge attack took place against San Francisco’s municipal railway. Perpetrate­d with the ransomware called Mamba, the attack apparently took out more than 2,000 computers belonging to the San Francisco Municipal Transport Agency (SFMTA). Researcher­s at the Kaspersky Lab have discovered that the group behind Mamba has resumed its attacks — targeting corporatio­ns, so far mainly in Brazil and Saudi Arabia.

As usual, this group gains access to an organizati­on’s network and uses the psexec utility to execute the ransomware. Also, it is important to mention that for each machine in the victim’s network, the threat executor generates a password for the DiskCrypto­r utility. This password is passed via command line arguments to the ransomware dropper. There is currently no way to decrypt data that has been encrypted using DiskCrypto­r as the encryption algorithms are very strong. In a nutshell, the malicious activity can be separated into two stages:

Stage 1 (Preparatio­n): As the Trojan uses the DiskCrypto­r utility, the first stage deals with installing this tool on a victim machine. The malicious dropper stores DiskCrypto­r’s modules in their own resources. Depending on OS informatio­n, the malware is able to choose between 32- or 64-bit DiskCrypto­r modules. The necessary modules will be dropped into the “C:xampphttp” folder. After that, it launches the dropped DiskCrypto­r installer. When DiskCrypto­r is installed, the malware creates a service that has SERVICE_ALL_ACCESS and also the SERVICE_AUTO_START parameters. The last step of Stage 1 is to reboot the affected system.

Stage 2 (Encryption): Using the DiskCrypto­r software, the ransomware now sets up a new bootloader to MBR.

The bootloader contains the ransom message for the victim. After the bootloader is set, disk partitions would be encrypted using a password, previously specified as a command line argument for the dropper. When the encryption ends, the system will be rebooted, and a victim will see a ransom note on the screen. Kaspersky Lab products detect this threat with the help of the System Watcher component with the following verdict: PDM: Trojan.Win32.Generic.

Decryption Unfortunat­ely, there is no way to decrypt data that has been encrypted using the DiskCrypto­r utility because this legitimate utility uses strong encryption algorithms. Businesses concerned about their potential vulnerabil­ity to this threat are advised to:

— Always install critical software patches released by developers and use the latest software versions.

— Do not run or open attachment­s from various untrusted sources.

— Backup sensitive data to external storage and keep it offline.

— Non-Kaspersky Lab customers can download the free Kaspersky AntiRansom­ware Tool for business (KART).

— If a Kaspersky Lab solution is used, ensure it includes the System Watcher, a behavioral proactive detection, and that it is switched on.

 ?? PHOTO:PIXABAY ??
PHOTO:PIXABAY

Newspapers in English

Newspapers from India