cybersecurity | news -九游官网下载
in october 2017, a wave of attacks began that is now better known as bad rabbit. initially, eastern european companies and authorities were the main targets. eventually, bad rabbit also spread to other countries, including germany. find out exactly what bad rabbit is and how you can protect yourself against it.
background: what is bad rabbit?
bad rabbit is a new form of ransomware. this form of cybercrime where the data of certain targets are encrypted has already established itself. bad rabbit is named after the page in the darknet, where the victim of this attack is able to pay the ransom in the hope of retrieving his or her data.
what is different about this encryption trojan?
bad rabbit is also known as a watering hole attack. this describes an approach in which it criminals are now focusing more on central, strategic goals, such as specific websites that potential targets frequently visit. so when victims visit a certain landing page, a drive-by download automatically starts. specifically, a fake adobe flash installation file is downloaded, which leads to an infection with bad rabbit. after a forced restart, all data is encrypted on the pc.
can bad rabbit also spread to the network?
bad rabbit is also able to spread across the it network of the company or agency. unlike wannacry and notpetya, bad rabbit does not exploit the vulnerability in the windows smb protocol. instead, other computers are infected via the windows management instrumentation (wmi).wmi is microsoft’s web-based enterprise management (wbem). among other things, you are able to obtain management data from remote computers with it.
how can you protect yourself from attacking the pc?
let's start with the protective measures you can do on the pc. there are two variants here.
variant 1
- block the execution of the files c: \ windows \ infpub.dat and c: \ windows \ cscc.dat.
- if possible, disable wmi on your windows system to prevent the malware from spreading through your network.
- insert a local anti-virus scanner.
variant 2
- we recommend the use of browser in the box. the technology used makes it possible to effectively protect against such an attack. the innovative approach to browser in the box is that the operating system and browser are completely separate. the browser itself runs on a pc in a virtual machine and thus a complete isolation is achieved. malware can not infect the user's pc and the network. more information can be found here on our website.
how can you protect your network?
as mentioned already, bad rabbit can also spread to the network. therefore, here are some suggestions for protecting your it network. this is where our gateprotect firewalls come into play:
in the network
1. separate important servers from your computers. the keyword here is “network separation”.
2. deploy network virus scanners.
protection at the gateway
- the virus scanner used by our gateprotect firewalls detects uds: dangerousobject.multi.generic over which badrabbit is running. we recommend that you use the proxy on http and https in order to use the virus scanner from the utm package safely.
- the content filter provided by us offers the possibility to block downloads. here you can block the download of any * .exe files.
- the content filter also provides the ability to block certain categories of websites. you should use the sub-categories "spam" and "malware" actively.
- important: generally, we advise against paying the ransom. it is not certain that your data will be decrypted after you have payed. take notpetya as an example; here the data wasn’t retrieved after payment. additionally, you may end up on a list that will be used to target you in the future.
need more information or more advice?
if you have further questions, please write an email to