Attacks/Breaches
6/27/2017
04:49 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More

With echoes of WannaCry, infections spread fast. Some security researchers describe malware as variant of Petya; others say it's a brand new sample.

Organizations in multiple countries have been reportedly hit in what appears to be the second global-scale ransomware attack in the last two months.

The fast-spreading outbreak has so far disrupted many organizations, including those in critical infrastructure sectors, in Russia, Ukraine, France, Spain, Netherlands, Denmark, and India.

Among those believed to have already fallen victim to the ongoing campaign are Russia's top oil company Rosneft, Danish shipping giant A.P Moller-Maersk, Russian metals manufacturer Evraz, Ukraine's Boryspyl Airport, US pharmaceutical company Merck, and radiation detection systems at Chernobyl.

Several security vendors today described the outbreak as similar to the WannaCry pandemic from last month in some aspects and different in others. The biggest difference is that the new attacks appear more professional and harder to stop via a killswitch like the one that took the wind out of WannaCry's sails.

"A clever security researcher was able to capitalize on a careless mistake made by the attackers behind WannaCry," to stop that threat, F-Secure security advisor Sean Sullivan said in a statement. "WannaCry’s attackers failed because they couldn’t handle the number of victims they created."

But the new campaign comes across as more professional. "Amateur hour is definitely over when it comes to launching global ransomware attacks," he said.

Kaspersky Lab said that its telemetry data as of Tuesday afternoon indicates at least 2,000 organizations have been impacted, most of them based either in Russia or Ukraine. The data also shows victims in Poland, Italy, the UK, Germany, France and the United States, Kaspersky Lab said.

Some security vendors tracking the virulent new threat identified the ransomware sample as GoldenEye, a variant of Petya, a pernicious malware threat that has been around for at least one year. That analysis appears to be based at least partly on the fact that the latest malware has been encrypting the Master Boot Record (MBR) on infected systems like Petya did, to prevent victims from trying to get rid of it by rebooting.

But others, like Kasperksy Lab, said their initial analysis showed the malware to be completely new and not seen previously. Chris Wysopal, co-founder and CTO of Veracode, said while the ongoing campaign has similar characteristics to Petya, the fact that only two AV products were able to detect it initially suggests it is new.

Like the WannaCry epidemic from May, the new malware has been propagating through Server Message Block (SMB) shares using the National Security Agency's (NSA) leaked EternalBlue exploit to spread to systems. Unlike WannaCry though, the new malware, which some have taken to calling NotPetya, also uses a previously known code execution vulnerability in WordPad and Microsoft Office [CVE 2017-0199] to propagate.

Risk Based Security described the Office and WordPad vulnerability as one that was first exploited back in October 2016 to deliver a spyware tool called FINSPY and later the Dridex banking Trojan. Microsoft issued a patch for the flaw this April.

Researchers at Cyphort said their analysis showed the malware's initial distribution method to be a malicious link in an email sent from an unknown source. In addition to SMB shares the new malware can also spread laterally to systems on an infected network using the Windows Management Instrumentation (WMI) feature. Cyphort said its researchers had observed some payloads to include a variant of the Loki Bot information stealing Trojan for extracting usernames and passwords from infected systems.

Victims are being asked to pay the equivalent of $300 in Bitcoin for their data to get unlocked.

"GoldenEye is a particularly virulent strain of the Petya ransomware that leverages the bones of Petya, but course-corrects weak spots in the original Petya strain," said Eldon Sprickerhoff, founder and chief security strategist at cyber security firm eSentire. Its creators have made it more effective by leveraging exploits associated with WannaCry, he said.

The wildfire-like nature in which the new malware appears to be spreading has once again highlighted the tremendous risk organizations are exposed to when they do not patch known vulnerabilities in a timely manner.

"This new Petya variant is spreading using the same NSA exploit employed by the WannaCry ransomware that made waves last month," says Lenny Zeltser, vice president of products at Minerva, an Israel-based provider of endpoint security tools.

"The rapid spread of this Petya variant shows that many companies have not implemented basic precautions, such as applying Microsoft's patch or segmenting the network and blocking unnecessary protocols, which would have blocked this propagation mechanism."

Galina Antova, co-founder of Claroty, described the situation as still evolving. "We will know more about the malware involved - and get better insights into the potential actors behind this wave of attacks - as we conclude analysis of samples in our lab over the next few hours," she says.

It is unclear yet whether what is going on is a resurgence of attacks from the same actors as that behind WannaCry or an entirely new campaign taking from lessons learned.

"What 2017 is showing us is a new threat landscape where targeted or spillover attacks are impacting the most critical industries," Antova says. "It's a matter of time before we see wide spread impact that will have immediate and reverberating consequences for the global economy. The game is changing and we need to move quickly to better secure our most critical networks."

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Search Cybersecuruty and you will get unicorn.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.