Attacks/Breaches

6/27/2017
04:49 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More

With echoes of WannaCry, infections spread fast. Some security researchers describe malware as variant of Petya; others say it's a brand new sample.

Organizations in multiple countries have been reportedly hit in what appears to be the second global-scale ransomware attack in the last two months.

The fast-spreading outbreak has so far disrupted many organizations, including those in critical infrastructure sectors, in Russia, Ukraine, France, Spain, Netherlands, Denmark, and India.

Among those believed to have already fallen victim to the ongoing campaign are Russia's top oil company Rosneft, Danish shipping giant A.P Moller-Maersk, Russian metals manufacturer Evraz, Ukraine's Boryspyl Airport, US pharmaceutical company Merck, and radiation detection systems at Chernobyl.

Several security vendors today described the outbreak as similar to the WannaCry pandemic from last month in some aspects and different in others. The biggest difference is that the new attacks appear more professional and harder to stop via a killswitch like the one that took the wind out of WannaCry's sails.

"A clever security researcher was able to capitalize on a careless mistake made by the attackers behind WannaCry," to stop that threat, F-Secure security advisor Sean Sullivan said in a statement. "WannaCry’s attackers failed because they couldn’t handle the number of victims they created."

But the new campaign comes across as more professional. "Amateur hour is definitely over when it comes to launching global ransomware attacks," he said.

Kaspersky Lab said that its telemetry data as of Tuesday afternoon indicates at least 2,000 organizations have been impacted, most of them based either in Russia or Ukraine. The data also shows victims in Poland, Italy, the UK, Germany, France and the United States, Kaspersky Lab said.

Some security vendors tracking the virulent new threat identified the ransomware sample as GoldenEye, a variant of Petya, a pernicious malware threat that has been around for at least one year. That analysis appears to be based at least partly on the fact that the latest malware has been encrypting the Master Boot Record (MBR) on infected systems like Petya did, to prevent victims from trying to get rid of it by rebooting.

But others, like Kasperksy Lab, said their initial analysis showed the malware to be completely new and not seen previously. Chris Wysopal, co-founder and CTO of Veracode, said while the ongoing campaign has similar characteristics to Petya, the fact that only two AV products were able to detect it initially suggests it is new.

Like the WannaCry epidemic from May, the new malware has been propagating through Server Message Block (SMB) shares using the National Security Agency's (NSA) leaked EternalBlue exploit to spread to systems. Unlike WannaCry though, the new malware, which some have taken to calling NotPetya, also uses a previously known code execution vulnerability in WordPad and Microsoft Office [CVE 2017-0199] to propagate.

Risk Based Security described the Office and WordPad vulnerability as one that was first exploited back in October 2016 to deliver a spyware tool called FINSPY and later the Dridex banking Trojan. Microsoft issued a patch for the flaw this April.

Researchers at Cyphort said their analysis showed the malware's initial distribution method to be a malicious link in an email sent from an unknown source. In addition to SMB shares the new malware can also spread laterally to systems on an infected network using the Windows Management Instrumentation (WMI) feature. Cyphort said its researchers had observed some payloads to include a variant of the Loki Bot information stealing Trojan for extracting usernames and passwords from infected systems.

Victims are being asked to pay the equivalent of $300 in Bitcoin for their data to get unlocked.

"GoldenEye is a particularly virulent strain of the Petya ransomware that leverages the bones of Petya, but course-corrects weak spots in the original Petya strain," said Eldon Sprickerhoff, founder and chief security strategist at cyber security firm eSentire. Its creators have made it more effective by leveraging exploits associated with WannaCry, he said.

The wildfire-like nature in which the new malware appears to be spreading has once again highlighted the tremendous risk organizations are exposed to when they do not patch known vulnerabilities in a timely manner.

"This new Petya variant is spreading using the same NSA exploit employed by the WannaCry ransomware that made waves last month," says Lenny Zeltser, vice president of products at Minerva, an Israel-based provider of endpoint security tools.

"The rapid spread of this Petya variant shows that many companies have not implemented basic precautions, such as applying Microsoft's patch or segmenting the network and blocking unnecessary protocols, which would have blocked this propagation mechanism."

Galina Antova, co-founder of Claroty, described the situation as still evolving. "We will know more about the malware involved - and get better insights into the potential actors behind this wave of attacks - as we conclude analysis of samples in our lab over the next few hours," she says.

It is unclear yet whether what is going on is a resurgence of attacks from the same actors as that behind WannaCry or an entirely new campaign taking from lessons learned.

"What 2017 is showing us is a new threat landscape where targeted or spillover attacks are impacting the most critical industries," Antova says. "It's a matter of time before we see wide spread impact that will have immediate and reverberating consequences for the global economy. The game is changing and we need to move quickly to better secure our most critical networks."

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
petitecougar
50%
50%
petitecougar,
User Rank: Apprentice
11/8/2017 | 12:50:33 PM
Petya
Petya is a great company, i really love them.
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-15137
PUBLISHED: 2018-07-16
The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.
CVE-2017-17541
PUBLISHED: 2018-07-16
A Cross-site Scripting (XSS) vulnerability in Fortinet FortiManager 6.0.0, 5.6.4 and below versions, FortiAnalyzer 6.0.0, 5.6.4 and below versions allows inject Javascript code and HTML tags through the CN value of CA and CRL certificates via the import CA and CRL certificates feature.
CVE-2018-1046
PUBLISHED: 2018-07-16
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow ...
CVE-2018-10840
PUBLISHED: 2018-07-16
Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.
CVE-2018-10857
PUBLISHED: 2018-07-16
git-annex is vulnerable to a private data exposure and exfiltration attack. It could expose the content of files located outside the git-annex repository, or content from a private web server on localhost or the LAN.