Bad Rabbit Bitcoin Ransomware Misery Continues As Hackers Demand $300 In BTC

October 26, 2017 3:33 pm Published by

More than 200 victims in Europe and around the world have been affected by a brand new ransomware attack demanding bitcoin to release encrypted files, reported Thursday.

Known as Bad Rabbit, the ransomware of unknown origin demands 0.05 BTC ($290) to unlock infected computers, the report said.

While mainly focused on Russia and Ukraine, outbreaks have also been reported in Turkey and Germany, according to cybersecurity firm Kaspersky Labs.

“While the target is visiting a legitimate website, a malware dropper is being downloaded from the threat actor’s infrastructure,” a report on the ransomware released Tuesday explains.

“No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to be an Adobe Flash installer,” the report said, adding “We’ve detected a number of compromised websites, all of which were news or media websites.”

As of earlier today, it’s apparent those targets fall outside the news and media sphere, the report said, with Odessa Airport and the Kiev Metro’s payment system also seeing breakdowns.

During the past six months, the report explains, both WannaCry and NotPetya have also struck the Russian and Ukrainian areas.

Bad Rabbit’s hackers seek a ransom similar to WannaCry at around $300 per machine, the report said.

Unlike NotPetya, however, there appears to be no attempt to wipe data from victims, even if they send the requisite Bitcoins, the report said.

Kaspersky adds it is not yet known whether paying the ransomware amount results in full control being returned., Jack Durschlag

Have your say:

Your email address will not be published. Required fields are marked *