Lepide Blog: A Guide to IT Security, Compliance and IT Operations

What do We Know About “Bad Rabbit”, and What can Businesses do to Protect Themselves

What do we know about bad rabbit

What we know so far about “Bad Rabbit”

Bad Rabbit is a new strain of ransomware, disguised as an Adobe Flash installer, which is downloaded by unsuspecting victims from compromised websites. Experts claim that it is likely to be linked to the “ExPetr” attack, as much of the same code was used. Both strains also used the same list of domains for the attack and both used the Windows Management Instrumentation Command-line (WMIC) to spread the malware.

Unlike ExPetr, bad Rabbit doesn’t use the EternalBlue vulnerability – a Microsoft Windows security vulnerability which allows an attacker to exploit a network file sharing protocol to read and write to files and request services. Instead, it uses a similar type of vulnerability called “EternalRomance”, which exploits the same network file sharing protocol, but uses remote code execution (RCE).

Most of the attacks targeted Russian news and media websites, although attacks have been reported in Ukraine, Turkey and Germany. The requested ransom is 0.05 bitcoin, which is $307 at the current exchange rate. However, evidence has yet to be accumulated regarding whether or not the attackers will decrypt the files once the ransom has been paid.

How can organisations protect themselves from Bad Rabbit?

There are a number of things you can do to help prevent the spread of Bat Rabbit in your IT infrastructure. Many of these apply to all (or at least most) strains of ransomware, so it’s worth noting them down and referring to it the next time you see something like this pop up in your news feed.

Here we go: