Newly discovered ransomware uses BitLocker to encrypt victim data

GOING NATIVE —

ShrinkLocker is the latest ransomware to use Windows’ full-disk encryption.

Stock photo of ransom note with letters cut out of newspapers and magazines.

A previously unknown piece of ransomware, dubbed ShrinkLocker, encrypts victim data using the BitLocker feature built into the Windows operating system.

BitLocker is a full-volume encryptor that debuted in 2007 with the release of Windows Vista. Users employ it to encrypt entire hard drives to prevent people from reading or modifying data in the event they get physical access to the disk. Starting with the rollout of Windows 10, BitLocker by default has used the 128-bit and 256-bit XTS-AES encryption algorithm, giving the feature extra protection from attacks that rely on manipulating cipher text to cause predictable changes in plain text.

Recently, researchers from security firm Kaspersky found a threat actor using BitLocker to encrypt data on systems located in Mexico, Indonesia, and Jordan. The researchers named the new ransomware ShrinkLocker, both for its use of BitLocker and because it shrinks the size of each non-boot partition by 100 MB and splits the newly unallocated space into new primary partitions of the same size.

“Our incident response and malware analysis are evidence that attackers are constantly refining their tactics to evade detection,” the researchers wrote Friday. “In this incident, we observed the abuse of the native BitLocker feature for unauthorized data encryption.”

ShrinkLocker isn’t the first malware to leverage BitLocker. In 2022, Microsoft reported that ransomware attackers with a nexus to Iran also used the tool to encrypt files. That same year, the Russian agricultural business Miratorg was attacked by ransomware that used BitLocker to encrypt files residing in the system storage of infected devices.

Once installed on a device, ShrinkLocker runs a VisualBasic script that first invokes the Windows Management Instrumentation and Win32_OperatingSystem class to obtain information about the operating system.

“For each object within the query results, the script checks if the current domain is different from the target,” the Kaspersky researchers wrote. “If it is, the script finishes automatically. After that, it checks if the name of the operating system contains ‘xp,’ ‘2000,’ ‘2003,’ or ‘vista,’ and if the Windows version matches any one of these, the script finishes automatically and deletes itself.”

A screenshot showing initial conditions for execution.

Enlarge / A screenshot showing initial conditions for execution.

Kaspersky

The script then continues to use the WMI for querying information about the OS. It goes on to perform the disk resizing operations, which can vary depending on the OS version detected. The ransomware performs these operations only on local, fixed drives. The decision to leave network drives alone is likely motivated by the desire not to trigger network detection protections.

Eventually, ShrinkLocker disables protections designed to secure the BitLocker encryption key and goes on to delete them. It then enables the use of a numerical password, both as a protector against anyone else taking back control of BitLocker and as an encryptor for system data. The reason for deleting the default protectors is to disable key recovery features by the device owner. ShrinkLocker then goes on to generate a 64-character encryption key using random multiplication and replacement of:

  • A variable with the numbers 0–9;
  • The famous pangram, “The quick brown fox jumps over the lazy dog,” in lowercase and uppercase, which contains every letter of the English alphabet;
  • Special characters.

After several additional steps, data is encrypted. The next time the device reboots, the display looks like this:

Screenshot showing the BitLocker recovery screen.

Enlarge / Screenshot showing the BitLocker recovery screen.

Kaspersky

Decrypting drives without the attacker-supplied key is difficult and likely impossible in many cases. While it is possible to recover some of the passphrases and fixed values used to generate the keys, the script uses variable values that are different on each infected device. These variable values aren’t easy to recover.

There are no protections specific to ShrinkLocker for preventing successful attacks. Kaspersky advises the following:

  • Use robust, properly configured endpoint protection to detect threats that try to abuse BitLocker;
  • Implement Managed Detection and Response (MDR) to proactively scan for threats;
  • If BitLocker is enabled, make sure it uses a strong password and that the recovery keys are stored in a secure location;
  • Ensure that users have only minimal privileges. This prevents them from enabling encryption features or changing registry keys on their own;
  • Enable network traffic logging and monitoring. Configure the logging of both GET and POST requests. In case of infection, the requests made to the attacker’s domain may contain passwords or keys;
  • Monitor for events associated with VBS execution and PowerShell, then save the logged scripts and commands to an external repository storing activity that may be deleted locally;
  • Make backups frequently, store them offline, and test them.

Friday’s report also includes indicators that organizations can use to determine if they have been targeted by ShrinkLocker.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Amazon Fire TV Cube (2022) review: a streaming box with no equal thumbnail

Amazon Fire TV Cube (2022) review: a streaming box with no equal

The new third-generation Fire TV Cube is Amazon’s fastest, most capable streaming player yet. Like its predecessors, the Cube is a hybrid Echo speaker and Fire TV that aims to provide the best of both worlds. Hands-free Alexa voice commands are always at your disposal, and it supports 4K streaming in all the popular HDR
Read More
小米新「卡針」專利,一個盤面三枝針,似UFO thumbnail

小米新「卡針」專利,一個盤面三枝針,似UFO

奇葩年年有,今年特別多。小米,作為「窮人」產品的「代言人」,在2021年8月5日,小米申請了一項外觀設計專利,申請號為 CN202130504200.1,授權的公告號為 CN307099232S,於近日發布消息,申請專利的產品居然是卡針,這可謂是名副其實的「雞肋」產品。據目前看來,卡針的唯一用途,就是在換手機電話卡的時候使用一次。一件可謂是一次性的產品,要不是電影裡面的暗黑交易,正常來說,一年估計用不著兩次。專利摘要,該設計產品的設計點在於外觀,呈圓盤型,每間隔120°安置有一枝卡針、整齊規劃的放置在中間的圓盤上,一共設有3枝卡針。我們難以想像其作用要點在哪裡,是否會與新機掛鉤得上。 其3針卡針,第一眼看上去誰會認為這是一個卡針,只會將其當作某個精密儀器的小零件罷了。其真正作用,到底是不是與新機有關,還是另有謀劃,我們敬請期待。
Read More
James Bond: There was really time to die.  And now? thumbnail

James Bond: There was really time to die. And now?

(Contém Spoilers) Se por acaso é fã da saga de filmes James Bond, é muito provável que soubesse que No Time To Die seria o último filme de Daniel Craig como 007. Mas… Talvez não soubesse que o lendário agente 007 iria morrer neste filme. Fim do AdBlock no Google Chrome num futuro próximo!? James…
Read More
Index Of News
Total
0
Share