Trojans that encrypt user files and try to 
extort a ransom from the victim in exchange for a decryptor utility are 
nothing new: in fact, they have been around for several years. These 
“Filecoders”, as we call them, are a prevalent category of ransomware, 
the other common type of ransomware being lockscreen scareware – 
ransomware that locks your desktop, displays a massage designed to look 
as it comes from local law-enforcement and, again demands a payment in 
order to regain access to your computer.
The reason why we’re bringing up this old issue is that 
we’ve noted a significant increase in Filecoder activity over the past 
few summer months and in this blog post we hope to address the many 
questions we’re getting about this issue.
ESET detections of this malware category are usually flagged as Win32/Filecoder, Win32/Gpcode or in some cases other family names.
Statistics
ESET LiveGrid® telemetry shows us that the weekly number of Win32/Filecoder detections have risen by over 200% since July 2013 from the average numbers in January through June 2013.The country most affected by these malware families is Russia, but spreading campaigns are active around different parts of the world:
Infection Vectors
As is the case with other trojan families, cybercriminals 
using the Filecoder ransomware have a number of different methods of 
getting the malware onto victims’ system:
- 
Through drive-by downloads from malware-laden websites
- 
Through e-mail attachments
- 
Installation by another trojan-downloader or backdoor (see 1st example scenario below)
- 
Manual installation by the attacker through RDP infiltration (see 2nd example scenario below)
- 
Other common infection vectors
In one infection scenario, we have seen Win32/Filecoder.Q (and later also Win32/Filecoder.AA and Win32/Filecoder.W) spread through backdoors, such as the Poison-Ivy R.A.T.
 In this scenario, the victims were sent the Poison-Ivy backdoor through
 email and if they were duped into executing the malware, it would 
contact a C&C server and wait for commands. The attacker would then 
send the Filecoder trojan to the infected machine, which would not be 
saved as a file to the hard drive, but run only in memory.
We have also seen different cases, when the attacker managed to install Filecoder ransomware onto the system manually through compromised Remote Desktop Protocol (RDP) credentials.
 We don’t have enough information as to how the “break in” occurred – 
exposed RDP ports, an existing infection with a keylogger, or 
bruteforcing a weak password are just some possible explanations. What’s
 important, though, is that in such a case the attacker can gain full 
access to the targeted machine just as if he was sitting behind the 
desk, disabling any antivirus protection and doing whatever they please,
 including installing malware.
In some of these cases, manual installation is also needed 
due to the fact that some variants require some “user interaction”, e.g.
 setting the encryption password.
Encryption Techniques
As mentioned in the introduction, this type of ransomware 
is more “dangerous” than the widespread ‘police’-ransomware category, as
 it also encrypts the victim’s files – usually pictures, documents, 
music and archives. A wide range of techniques and levels of 
sophistication has been seen in different variants over time:
- 
The encryption can be implemented in the trojan code, or by using (legitimate) 3rd party tools (e.g. LockDir, WinRAR password-protected archives, etc.)
- 
Some variants encrypt the whole file, others only parts of it (for example when slower RSA is used)
- 
Various methods have been used to dispose of the original file: in some cases, the clean file is deleted and could be recovered by using “undelete” recovery tools, other times the file was deleted securely (e.g., by using Microsoft SysInternals SDelete) or simply overwritten
Different encryption methods are used:
- 
other methods
…and also the encryption keys can be:
- 
Hard coded in the binary
- 
Entered manually (by command-line or through a dialog box, when the attacker has RDP access to the infected machine)
- 
Randomly generated (using various random-functions) and sent to the attacker
Some active examples
A Filecoder family that has been spreading via RDP and has 
noticeably improved its tactics over time also uses scareware tricks and
 introduces itself as an “Anti-Child Porn Spam Protection” message or as
 being from the “ACCDFISA” (“Anti Cyber Crime Department of Federal 
Internet Security Agency”) – no such agency exists, of course. A 
comprehensive write-up of different versions can be found on Emsisoft’s blog. Although this particular variant, detected by ESET as Win32/Filecoder.NAC, has been around for quite a while, it is still active in the wild.
This trojan also stands out because of the amount of money 
it asks for. While other samples in this malware category usually 
request sums around 100 – 200€, Win32/Filecoder.NAC has been seen 
extorting up to 3000€. The high amount is consistent with the fact that 
the attacker usually targets businesses that can usually afford to pay 
higher ransoms than individuals.
Win32/Filecoder.BH,
 also known as DirtyDecrypt, features an interesting method of 
displaying the ransom notice to the user. During the encryption cycle 
the content of image files, as well as documents,  is overwritten with 
the notice followed by the encrypted original bytes.
Another
 recent variant, Win32/Filecoder.BQ, tries to put the victims under 
pressure by displaying a countdown timer showing how long it will be 
before the encryption key is permanently deleted. Interestingly, victims
 are given the option to pay the ransom with Bitcoins, along with usual 
ransomware payment methods like MoneyPak or Ukash. More details on this 
variant can be found in ESET’s Threat Encyclopedia entry: Win32/Filecoder.BQ.
Some Filecoder variants are even built by using a special builder
 utility, similarly to banking trojan builders sold on underground 
forums. The builder allows the attacker to select what file types are to
 be encrypted, the desired encryption method, displayed ransom message, 
and so on.
A few words of advice
In some cases, when the Filecoder uses a weak cipher, or a 
faulty implementation, or stores the encryption password somewhere to be
 recovered, it may be possible to decrypt the files. Unfortunately, in 
most cases, the attackers have learned to avoid these mistakes and 
recovering the encrypted files without the encryption key is nearly 
impossible.
If remote access to a computer is required, proper security
 measures must be taken, RDP should not be open to the public Internet 
and a VPN with two-factor authentication should be used.
It is also a good idea to password-protect your 
anti-malware software’s settings to prevent them from being altered by 
an attacker.
The
 general computer security advice about being cautious and keeping your 
anti-virus and all software up-to-date applies, of course, but in this 
case, most importantly: backup regularly!
No comments:
Post a Comment