Rantburg

Today's Front Page   View All of Tue 05/21/2024 View Mon 05/20/2024 View Sun 05/19/2024 View Sat 05/18/2024 View Fri 05/17/2024 View Thu 05/16/2024 View Wed 05/15/2024
2019-06-06 Cyber
No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware
[KREBSONSECURITY] For almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as "Robbinhood." Media publications have cited sources saying the Robbinhood version that hit Baltimore city computers was powered by "Eternal Blue," a hacking tool developed by the U.S. National Security Agency (NSA) and leaked online in 2017. But new analysis suggests that while Eternal Blue could have been used to spread the infection, the Robbinhood malware itself contains no traces of it.

On May 25, The New York Times

...which still proudly displays Walter Duranty's Pulitzer prize...


Continued from Page 2


cited unnamed security experts briefed on the attack who blamed the ransomware’s spread on the Eternal Blue exploit, which was linked to the global WannaCry ransomware outbreak in May 2017.

That story prompted a denial from the NSA that Eternal Blue was somehow used in the Baltimore attack. It also moved Baltimore City Council President Brandon Scott to write the Maryland governor asking for federal disaster assistance and reimbursement as a result.

But according to Joe Stewart, a seasoned malware analyst now consulting with security firm Armor, the malicious software used in the Baltimore attack does not contain any Eternal Blue exploit code. Stewart said he obtained a sample of the malware that he was able to confirm was connected to the Baltimore incident.

"We took a look at it and found a pretty vanilla ransomware binary," Stewart said. "It doesn’t even have any means of spreading across networks on its own."

Stewart said while it’s still possible that the Eternal Blue exploit was somehow used to propagate the Robbinhood ransomware, it’s not terribly likely. Stewart said in a typical breach that leads to a ransomware outbreak, the intruders will attempt to leverage a single infection and use it as a jumping-off point to compromise critical systems on the breached network that would allow the malware to be installed on a large number of systems simultaneously.

"It certainly wouldn’t be the go-to exploit if your objective was to identify critical systems and then only when you’re ready launch the attack so you can do it all at once," Stewart said. "At this point, Eternal Blue is probably going to be detected by internal [security] systems, or the target might already be patched for it."

It is not known who is behind the Baltimore ransomware attack, but Armor said it was confident that the bad actor(s) in this case were the same individual(s) using the now-suspended twitter account @Robihkjn (Robbinhood). Until it was suspended at around 3:00 p.m. ET today (June 3), the @Robihkjn account had been taunting the mayor of Baltimore and city council members, who have refused to pay the ransom demand of 13 bitcoin ‐ approximately $100,000.

In several of those tweets, the Twitter account could be seen posting links to documents allegedly stolen from Baltimore city government systems, ostensibly to both prove that those behind the Twitter account were responsible for the attack, and possibly to suggest what may happen to more of those documents if the city refuses to pay up by the payment deadline set by the extortionists ‐ currently June 7, 2019 (the attackers postponed that deadline once already).

Over the past few days, however, the tweets from @Robinhkjn have grown more frequent and profanity-laced, directed at Baltimore’s leaders. The account also began tagging dozens of news hounds and news organizations on Twitter.

Stewart said the @Robinhkjn Twitter account may be part of an ongoing campaign by the attackers to promote their own Robbinhood ransomware-as-a-service offering. According to Armor’s analysis, Robbinhood comes with multiple HTML templates that can be used to substitute different variables of the ransom demand, such as the ransom amount and the .onion address that victims can use to negotiate with the extortionists or pay a ransom demand.

"We’ve come to the conclusion Robbinhood was set up to be a multi-tenant ransomware-as-a-service offering," Stewart said. "And we’re wondering if maybe this is all an effort to raise the name recognition of the malware so the authors can then go on the Dark Web and advertise it."

This redacted message is present on the Dark Web panel set up by the extortionists to accept payment for the Baltimore ransomware incident and to field inquiries or pleas from them. The message repeats the last tweet from the @robihkjn Twitter account and conclusively ties that account to the attackers. Image: Armor.

There was one other potential ‐ albeit likely intentional ‐ clue that Stewart said he found in his analysis of the malware: Its code included the text string "Valery." While this detail by itself is not particularly interesting, Stewart said an earlier version of the GandCrab ransomware strain would place a photo of a Russian man named Valery Sinyaev in every existing folder where it would encrypt files. PCRisk.com, the company that blogged about this connection to the GandCrab variant, asserts Mr. Sinyaev is a respectable finance professional who has nothing to do with GandCrab.

The timing of the GandCrab connection is notable because just last week, the creators of GandCrab announced they were shutting down their ransomware-as-a-service product, allegedly after earning more than $2 billion in ransom payments.
Posted by Fred 2019-06-06 00:00|| || Front Page|| [21 views ]  Top

#1 So they were just lazy incompetent bumblers running Baltimore's servers who didn't even attempt to do due diligence. What happened to jail time for not being qualified at all to run a government department.
Posted by 3dc 2019-06-06 07:06||   2019-06-06 07:06|| Front Page Top

#2 So they were just lazy incompetent bumblers running Baltimore's servers who didn't even attempt to do due diligence.

You can bet they were racially correct and related to someone making the hiring decisions, though
Posted by Frank G 2019-06-06 08:36||   2019-06-06 08:36|| Front Page Top

#3 H1Bs are not responsible for the quality/quantity of their work.
Posted by Skidmark 2019-06-06 09:04||   2019-06-06 09:04|| Front Page Top

#4 "What do you mean you 'just forgot the password'?"
Posted by SteveS 2019-06-06 09:09||   2019-06-06 09:09|| Front Page Top

#5 "My Voice is my Passport" doesn't sound the same in Eubonics.

Probably made the machine confused.
Posted by Mullah Richard 2019-06-06 12:25||   2019-06-06 12:25|| Front Page Top

00:34 badanov
00:04 EMS Artifact









Paypal:
Google
Search WWW Search rantburg.com