facebook linkedin twitter

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

Focused in Russia and Ukraine but also spotted in Bulgaria, Germany, and Turkey, Bad Rabbit shut down Russia’s Interfax Agency--a major news outlet--as well as Ukraine’s Kiev Metro, the Odessa International Airport, and both the Ministry of Infrastructure and the Ministry of Finance. The attack on Kiev Metro was found to leverage Diskcoder.D, yet another variant of the infamous Petya ransomware.

Fortunately, there is a considerably lesser chance of Bad Rabbit repeating what WannaCry managed to accomplish during its spread across Europe and, to a lesser extent, North America. This is because, instead of relying on a worm as WannaCry did, Bad Rabbit uses a server message block vulnerability called EternalRomance to spread, after being downloaded while disguised as an Adobe Flash installer on legitimate websites. It would also appear that Bad Rabbit and NotPetya (another significant ransomware attack) were deployed by the same threat actor, as 67 percent of their codebases are the same.

There is also evidence that this threat actor is a Game of Thrones fan, as the code strings used in Bad Rabbit include character names from the novels and television series.

Unfortunately, Bad Rabbit should not have been able to spread as far as it has, as Microsoft released a patch for EternalRomance in March, when the EternalBlue vulnerability was also patched. This makes this attack yet another example of why it is crucial to install patches and updates when they are released--if the organizations affected by Bad Rabbit had done so, they would not be in the position they are now.

Computerware can help you make sure that your systems are not left vulnerable to attacks like this by managing your patches and updates for you. Reach out by calling (703) 821-8200 for more information.

Tip of the Week: It’s Easy to Color-Code Your Goog...
Security Should Come In Two Parts
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer User Tips Smartphones Gadgets Quick Tips Mobile Devices Business Continuity Innovation Disaster Recovery Virtualization Network Microsoft Office Mobile Office Android Social Media Mobile Device Management VoIP Server Smartphone Collaboration Communication Miscellaneous Upgrade Windows 10 Ransomware Unified Threat Management Windows Data Backup Data Recovery Operating System Remote Monitoring Tech Term IT Support Passwords BYOD Managed IT services Remote Computing Mobile Computing Productivity Vendor Management Holiday Facebook communications WiFi Cybersecurity Apps BDR The Internet of Things Analytics Marketing Apple Users Automation Firewall History Data Management Phishing Mobile Device Outsourced IT Internet of Things Alert Managed IT Services Save Money Big data App IT Consultant Artificial Intelligence Browser Encryption Maintenance Content Filtering Spam Going Green Health Gmail Bring Your Own Device Bandwidth Office Antivirus Cost Management Printer Tech Support Virus Best Practice Information Technology Lithium-ion Battery Office 365 Hiring/Firing Hard Drives Budget Two-factor Authentication Help Desk Wireless Technology Windows 8 Managed IT Search Outlook Cybercrime Cloud Computing Hacking Money Document Management IBM Training Phone System Saving Time Computers VPN Travel Business Technology Recovery Employer-Employee Relationship Update Risk Management Humor Windows 10 Save Time Legal Networking Regulations Proactive IT Running Cable Access Control SaaS Customer Service Hard Drive Law Enforcement It Management Intranet Administration Website Education Government Compliance Data storage Word Black Market Flexibility Avoiding Downtime Applications Data Breach Laptop Business Intelligence Password Cortana Business Growth Digital Payment iPhone Project Management Hacker Downtime Machine Learning Comparison Tablet Excel Paperless Office Telephone Systems Company Culture User Sports Computer Repair Customer Relationship Management Augmented Reality Disaster Social Networking Computing Hosted Solution Current Events PowerPoint End of Support Information Robot File Sharing Wireless Data Security Securty Twitter DDoS Solid State Drive Mobility Patch Management Blockchain Data Loss Fax Server Social Engineering Scam Chromebook Retail Redundancy Cryptocurrency Net Neutrality Computing Infrastructure Hack Inbound Marketing eWaste How To Value Google Docs Chrome Experience Download Private Cloud Cleaning Managed Service Digital Monitors Router Pain Points Computer Accessories Office Tips Telephony Conferencing Processors Websites USB Start Menu Tech Terms Taxes Trending Distributed Denial of Service Presentation Mobile Technology YouTube Mouse Monitoring Software as a Service Unified Communications Settings Public Cloud Virtual Desktop Uninterrupted Power Supply Specifications Safety Gaming Console Statistics Programming Social Co-managed IT Identity Theft User Error Network Congestion Management Documents Bitcoin Heating/Cooling Text Messaging Data Protection Entertainment Webcam IT service Storage Vulnerabilities Google Maps Virtual Reality Streaming Media Politics Healthcare Automobile Lifestyle Emails Vendor Bluetooth Motion Sickness Startup Asset Tracking Domains Smart Phones Assessment SharePoint Read Scalability Business Cards Service Level Agreement Browsers Tip of the week Work/Life Balance Username Public Speaking Google Calendar Best Practives Deep Learning Messenger Unified Threat Management Tracking Backup and Disaster Recovery Gamification Shortcut Adminstration Pirating Information VoIP Rental Service Meetings Screen Reader Customer Resource management Leadership Touchscreen User Tip News Visible Light Communication Memory Device Management Upload Entrepreneur Knowledge Microserver Business Managemenet Web Server Smart Tech Distribution Troubleshooting Consultation Evernote IT consulting Content Management Piracy Cabling Data Analysis Virtual Assistant Wi-Fi Administrator HTML HIPAA Technology Tips Books Fiber-Optic Workers Database Environment online Currency Mobile Security Competition Audit CIO Get More Done Supercomputer Telephone System Electronic Payment Fake News Advertising Flash Software License Worker Trends Staffing Google Wallet Turn Key Microchip Multi-Factor Security Cost Business Owner Data Warehousing Windows XP Printer Server Upselling Emergency Hard Drive Disposal Society LinkedIn Devices IP Address Access Trojan Displays Reading Fraud Samsung Tactics G Suite UTM Content Application Video Surveillance Computer Care Micrsooft Employer Employee Relationship Human Resources Proxy Server Microsoft Excel Organize IT Plan Licensing Enterprise Resource Planning Drones Skype Hacks Physical Security Legislation Error Saving ZTime Google Drive Electronic Medical Records Windows Server 2008 Archive Vulnerability Banking Botnet Accountants A.I. Spyware Mobile Payment Relocation email scam Tablets Addiction Permissions Language Sync Multi-factor Authentication Digital Signature Debate Electricity Printing Point of Contact Harddrive Dark Web Migration Connected Devices Teamwork GPS Notifications CCTV Wireless Headphones Telephone Health IT Windows 7 Webinar Music Business Metrics Computer Malfunction Equifax Fleet Tracking External Harddrive cache Television switches Writing Reliable Computing Network Management Recycling In Internet of Things Device security MSP WannaCry Downloads Upgrades Analytic PDF Bookmark Desktop Finance Best Available Keyboard 3D Ebay Corporate Profile Product Reviews Nanotechnology Social Network Thin CLient Time Management Freedom of Information LiFi CrashOverride 3D Printing Managing Stress Capital Printers Fileless Malware Regulation Productuvuty

toner1