Dark side ransomware on colonial pipeline network

We all know about the recent ransomware attack on Colonial pipeline. With regard to this, let us try to understand what happened exactly:

About the firm: The largest refined products pipeline in the US, it is involved in transporting over 100 million gallons of fuel across their corridors.

The recent ransomware attack against colonial pipeline's networks led to an emergency declaration in 17 states and the district of Columbia across 5,500 miles of fuel pipeline




Let’s understand about Darkside ransomware

Darkside is a relatively new ransomware strain that made its first appearance in August 2020. It follows RaaS (ransomware-as-a-service) model.

It follows a double extortion trend like:

1.      Threat actors encrypt the user’s data

2.      Exfiltrate the data and threaten to make it public if the ransom demand is not paid.

Their ransom demand ranges between $200,000 to $2,000,000.

Let’s now understand how the attack vector of this:

1.      Downloading the ransomware- it is specialized to start post gaining an initial foothold in the network

2.      The attackers use PowerShell to download the darkside binary as “update.exe” using the “download file” command, abusing certutil.exe and bitsadmin.exe in the process

3.      It downloads the darkside binary into the c:\windows and temporary directories as well as creating a shared folder on the infected machine and using PowerShell to download a copy of the malware there.

4.      Post initial access, the attacker than uses lateral movement, with the main goal of conquering the domain controller (DC)

5.      Post getting domain access, user hashes are dumped

6.      The attackers use PowerShell to download the darkside binary from the shared folder created on the initial system (patient zero)

7.      A shared folder using the company’s name on the DC is created and darkside binary is coped in it.

8.      Post data exfiltration, attackers use bitsadmin.exe to distribute the ransomware binary from the shared folder to systems

Mode of infection of the ransomware:

1.      Post execution on initial host, it checks the language on the system, using getsystemdefaultuilanguage() and getuserdefaultlangid() functions to avoid systems located in the former soviet bloc countries from being encrypted

2.      Then certain services related to security and backup solutions are stopped including:

·        Vs

·        sql

·        svc

·        memtas

·        Mepocs       

·        sophos

·        veeam         

·        backup

3.      A C2C (command and control) server is established with different samples analyzed, the attackers uses its programmed IPs.

4.      Post deleting the volume shadow copy service (vss), the ransomware deletes the shadow copies using an obfuscated PowerShell script that uses WMI

5.      Running processes are enumerated and the common goal is to both steal related information stored in the files as well as encrypt them.

6.      Darkside creates a unique user_id string for the victim, and adds it to the encrypted files extension as <file_name>.{userid}. In addition, the malware also changes the icons for the encrypted files and changes the background of the desktop:

7.      It finally leaves a ransom note: “readme.{userid}.txt”:

 

 

Comments

Popular posts from this blog

Stored XSS in Wonder CMS- CVE-2017-14522

Arbitrary file upload and RCE in Wonder CMS - CVE-2017-14521

Cross Site Request Forgery- Intex Router N-150 | CVE-2018-12529