Readers like you help support MUO. If you make a purchase through links on our site, we may receive an affiliate commission. Continue reading.
Imagine you are working on your device and suddenly you realize that you cannot access your files. You could be a victim of Bad Rabbit ransomware attack.
Although the first instance of this attack targeted organizations in Ukraine and Russia, Bad Rabbit ransomware is now widespread, affecting individuals worldwide.
Table of Contents
What is Bad Rabbit ransomware attack?
Bad Rabbit Ransomware is a type of malicious software that hackers use to encrypt data on a computer or network so they can demand a ransom from the victim to unlock it. It was first detected in 2017 and is thought to be a variant of the Petya ransomware, a notorious malware attack.
Although crack code has been developed for Petya ransomware, threat actors have adapted their tactics and are increasingly using Bad Rabbit ransomware.
Bad rabbit attackers typically request bitcoin payments in exchange for a decryption key to unlock the files. Note that only unpatched Windows 7 and newer Windows operating systems are vulnerable to Bad Rabbit ransomware attacks.
This ransomware doesn’t use traditional methods i.e. spreading via phishing emails. Instead, the creator – who is oddly obsessed with Game of Thrones and reflects this with references in the malware’s code – embeds its ransomware into websites by injecting JavaScript into the website’s HTML.
The owners of those websites that contain the ransomware might not know that the evil rabbit is hidden in their service.
How does Bad Rabbit ransomware work?
This ransomware uses the EternalBlue exploit created by the NSA and leaked in 2017. This exploit targets vulnerabilities in Microsoft’s Server Message Block (SMB) protocol, which is used for file and printer sharing.
If a computer is running a compromised version of the SMB protocol, an attacker could use this protocol to look for open shares and distribute them to other computers.
Additionally, Bad Rabbit Ransomware can spread by injecting code into the explorer.exe process, which also causes the malware to travel from one computer to another via network connections.
After riskVictims of Bad Rabbit ransomware usually receive a similar version of this text:
Oops! Your files have been encrypted.
If you see this text, your files are no longer accessible. You may have been looking for a way to recover your files. Don’t waste your time. Nobody will be able to recover them without our decryption service. We guarantee that you can safely recover all your files. All you have to do is submit the payment and get the decryption password… If you already have the password, please enter it below.
Password #1: –
It contains a website address where you can also pay.
If you try to access your servers or files on your PC and you see text like the one above, your computer has been infected. You will likely be asked to pay a certain fee before a deadline. But many victims have reported that even after paying the ransom, their files were still inaccessible.
Even if you pay, you may not get your data back.
If you download this ransomware unknowingly, it will not be installed automatically; You must launch the Adobe update in order for Bad Rabbit to run. Spread through computers on a network, the malware uses a combination of simple usernames and passwords to infect computers.
How to recover files after Bad Rabbit ransomware attack
A bad rabbit attack is deadly, and recovering files can be tedious and time-consuming.
There are numerous steps you can take to recover your data. However, before you run these, make sure your computer is disconnected from the internet to prevent the ransomware from encrypting any more of your files.
Restore from backups
If you have an up-to-date version of your files in a backup system, you just need to restore them as soon as possible. However, before doing so, make sure to remove the ransomware from your computer. This can be done by resetting your system to default settings. After the reset, you can safely upload your backups.
Ransomware decryption tools
Security experts have developed various ransomware decryption tools. They help interrupt the decryption of your files by using complex algorithms tested with different ransomware versions.
However, before using any tool, make sure you trust the source as ransomware can also be disguised as a decryption tool. If you are unsure, consult an IT professional.
Windows system restore
System Restore, a feature in Microsoft Windows, allows you to restore your computer to an earlier point in time, known as a restore point. You can restore system files, installed applications, Windows registry and even system settings.
This feature can be useful when dealing with malicious malware or faulty software installation.
Here are the steps to use the system restore tool on a Windows computer:
- Go to the Start menu and type “Control Panel” in the search box.
- After navigating to the app, search for and click recreation.
- Then tap Open System Restore Button.
- Click on Next to start the recovery process.
- Select your preferred restore point and click on the appropriate one Next Button.
- Confirm the selected restore point and click Finished Button.
- Wait for the recovery process to complete and restart your computer.
How to prevent a Bad Rabbit ransomware attack
As common as Bad Rabbit attacks are, they can be prevented by strictly following a few simple practices.
Update your operating system
Attackers exploit vulnerabilities in software to gain access to a system or network. By updating your operating system and software with the latest security updates and patches, you can eliminate these vulnerabilities and reduce the risk of a ransomware attack.
Avoid clicking on unfamiliar links and attachments
Ransomware is often delivered via malicious links or attachments in emails or other messages. Avoid downloading attachments or clicking links from unknown sources as it reduces the risk of becoming a victim of an attack.
Backups and Firewalls
Bad Rabbit Ransomware encrypts your files and holds them hostage until you pay the ransom. By regularly backing up and securely storing your important data (i.e. disconnecting it from your computer), you can recover your files if they were encrypted by ransomware.
Firewalls and intrusion detection systems can also help prevent unauthorized access to your network. By enabling these security features on all your devices, you can reduce the risk of a ransomware attack.
Passwords and 2FA
Use strong passwords and two-factor authentication whenever possible. They can help prevent unauthorized access to your system and reduce the risk of a ransomware attack. Note that malware can cause unusual network activity. Pay attention so you can react quickly to an attack.
Bad Rabbit Ransomware: Prevention is the priority
Bad Rabbit Ransomware can enter your computer and encrypt your files when you visit untrustworthy websites.
Prevention should be a priority, but creating an incident response plan can help you respond quickly and effectively when an attack occurs. The incident response plan should outline the steps to take in the event of a ransomware attack, including containing the attack and recovering data if mitigation fails.
This article was previously published on Source link