A rare instance of ransomware targeting Linux-based file storage systems (network-attached storage servers, specifically) has been spotted, spreading via 15 separate but related campaigns. The adversaries behind the effort are continuing their depredations on an ongoing basis, according to researchers, so targets are expected to proliferate. Researchers at Intezer Labs dubbed the malware “QNAPCrypt,” after QNAP, one of the larger NAS server vendors out there. “NAS servers normally store large amounts of important data and files, which make them a valuable target for attackers and especially a viable target for ransomware campaigns,” Intezer researcher Ignacio Sanmillan said in an analysis of the malware, posted this week. However, he noted that “It is rare to see ransomware being used to target the Linux operating system.” QNAPCrypt has a few attributes that differ from the standard ransomware bag of tricks, the researchers said. Like many ransomwares, it’s an ARM variant that encrypts all files, but the ransom note is delivered solely as a text file left on the machine, without any message on the screen. “Naturally, because it is a server and not an endpoint,” Sanmillan pointed out. Also, every victim is provided with a different, unique Bitcoin wallet – an aspect that helps attackers avoid being traced via the money flows – being traced. Once a victim is compromised, the malware requests a wallet address and a public RSA key from the command and control server (CC2) before file encryption. It’s this wallet function that has proved to be a bit of an Achilles Heel for the attackers. Researchers determined a couple of what the researcher said are “major design flaws” that allows them to temporarily block the threat actors’ operations. First off, the list of bitcoin wallets was static and created in advance of the campaign. “Therefore, it does not create a new wallet for each new victim in real time, but rather it pulls a wallet address from a fixed, predetermined list,” explained the researchers. Secondly, the list, being static, is also finite. “Once all of the wallets are allocated (or sent), the ransomware would not be able to continue its malicious operation in the victim’s machine,” they said. This opened the door to Intezer being able to mount what was essentially a denial-of-service (DoS) attack by simulating the infection of more than 1,091 victims, forcing the attackers to run through their list of unique Bitcoin wallets to supply to their victims. “While researching the ARM instance of the malware, we observed that there was a request through their REST API in order to retrieve new victim configuration keys,” Sanmillan explained, adding that this is done via a connection to a SOCKS5 proxy. Herein lies a third design flaw That connection, to a SOCKS5 proxy, is completed without any authentication enforced, so anyone would have the capability to connect to it. “This idea simply abuses the fact that no authentication is enforced to connect to the SOCKS5 proxy,” Sanmillan explained. “Since the authors behind this ransomware were delivering one Bitcoin wallet per victim from a static pool of already generated wallets, we could replicate the infection packets to retrieve all of the wallets until they had no further wallets under their control. Therefore, when a genuine infection would occur, the ransom client would not be able to retrieve configuration artifacts.” The attackers took notice, and it wasn’t long before Intezer spotted updated QNAPCrypt variants. “As a result…the authors behind this malware were forced to update their implants in order to circumvent this design flaw in their infrastructure to continue with their malicious operations,” Samillan said. “After several days of continuously DoS’ing QNAPCrypt clients, we encountered another QNAPCrypt sample—but this time targeting x86 systems.” This newer implant reuses a large portion of code with old instances of x86 Linux.Rex, a malware that made headlines in 2016 as a self-replicating trojan that uses infected machines to create a peer-to-peer botnet, in order to conduct ransomware and DDoS operations. “We interpret the discovery of these newer instances with hardcoded configuration to be a response from the threat actors behind this campaign to attempt to circumvent the DoS,” Sanmillan said. “This implied that they were forced to change their implants and to centralize their bitcoin wallets, making the tracking of their income via their ransomware campaigns more convenient.” Intezer determined that the initial attack vector for the campaigns is SSH brute-force attacks, so administrators should take care to update their credentials with strong passwords in order to avoid an infection. Don’t miss our free live Threatpost webinar, “Streamlining Patch Management,” on Wed., July 24, at 2:00 p.m. EDT. Please join Threatpost editor Tom Spring and a panel of patch experts as they discuss the latest trends in Patch Management, how to find the right solution for your business and what the biggest challenges are when it comes to deploying a program. Register and Learn More
https://govanguard.io/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard https://govanguard.io/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-07-12 12:09:002019-07-12 12:09:00Unusual Linux Ransomware Targets NAS Servers
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com