{"id":17096,"date":"2020-07-28T14:03:57","date_gmt":"2020-07-28T10:03:57","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-vhd-ransomware\/17096\/"},"modified":"2020-07-28T14:03:57","modified_gmt":"2020-07-28T10:03:57","slug":"lazarus-vhd-ransomware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-vhd-ransomware\/17096\/","title":{"rendered":"Lazarus experiments with new ransomware"},"content":{"rendered":"<p>The Lazarus group has always stood out for using methods typical of APT attacks but specializing in financial cybercrime. Recently, our experts detected fresh, previously unexplored VHD malware, which Lazarus seems to be experimenting with.<\/p>\n<p>Functionally, VHD is a fairly standard ransomware tool. It creeps through the drives connected to a victim\u2019s computer, encrypts files, and deletes all System Volume Information folders (thereby sabotaging System Restore attempts in Windows). What\u2019s more, it can suspend processes that could potentially protect important files from modification (such as Microsoft Exchange or SQL Server).<\/p>\n<p>But what\u2019s really interesting is how VHD gets onto target computers, because its delivery mechanisms have more in common with APT attacks. Our experts recently investigated a couple of VHD cases, analyzing the attackers\u2019 actions in each.<\/p>\n<h2>Lateral movement through the victim\u2019s network<\/h2>\n<p>In the first incident, our experts\u2019 attention was drawn to the malicious code responsible for spreading VHD over the target network. It turned out that the ransomware had at its disposal lists of IP addresses of the victim\u2019s computers, as well as credentials for accounts with admin rights. It used that data for brute-force attacks on the SMB service. If the malware managed to connect using the SMB protocol to the network folder of another computer, it copied and executed itself, encrypting that machine also.<\/p>\n<p>Such behavior is not very typical of mass ransomware. It suggests at least a preliminary reconnaissance of the victim\u2019s infrastructure, which is more characteristic of APT campaigns.<\/p>\n<h2>Chain of infection<\/h2>\n<p>The next time our Global Emergency Response Team encountered this ransomware during an investigation, the researchers were able to trace the entire infection chain. As they reported, the cybercriminals:<\/p>\n<ol>\n<li>Gained access to victims\u2019 systems by exploiting a vulnerable VPN gateway;<\/li>\n<li>Obtained admin rights on the compromised machines;<\/li>\n<li>Installed a backdoor;<\/li>\n<li>Seized control of the Active Directory server;<\/li>\n<li>Infected all computers on the network with the VHD ransomware using a loader specially written for the task.<\/li>\n<\/ol>\n<p>Further analysis of the tools employed showed the backdoor to be part of <a href=\"https:\/\/www.kaspersky.com\/blog\/mata-framework\/36458\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">the multiplatform MATA framework<\/a> (which some of our colleagues call Dacls). We\u2019ve concluded that it\u2019s another Lazarus tool.<\/p>\n<p>You\u2019ll find a detailed technical analysis of these tools, together with indicators of compromise, <a href=\"https:\/\/securelist.com\/lazarus-on-the-hunt-for-big-game\/97757\/\" target=\"_blank\" rel=\"noopener noreferrer\">in the relevant article on our Securelist blog<\/a>.<\/p>\n<h2>How to protect your company<\/h2>\n<p>The VHD ransomware actors are clearly a cut above average when it comes to infecting corporate computers with a cryptor. The malware is not generally available on hacker forums; rather, it\u2019s specifically developed for targeted attacks. The techniques used to penetrate the victim\u2019s infrastructure and propagate within the network recall sophisticated APT attacks.<\/p>\n<p>This gradual blurring of the boundaries between financial cybercrime tools and APT attacks is proof that even smaller companies need to consider using more advanced security technologies. With that in mind, we recently unveiled an integrated solution with both Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) functionality. You can find out more about the solution on <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security\/endpoint-security-solution?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">its dedicated page<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\">\n","protected":false},"excerpt":{"rendered":"<p>The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.<\/p>\n","protected":false},"author":700,"featured_media":17097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1702,433,81],"class_list":{"0":"post-17096","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-lazarus","11":"tag-ransomware","12":"tag-targeted-attacks"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-vhd-ransomware\/17096\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/lazarus-vhd-ransomware\/21633\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/lazarus-vhd-ransomware\/22905\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/lazarus-vhd-ransomware\/21091\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/lazarus-vhd-ransomware\/19773\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/lazarus-vhd-ransomware\/23573\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/lazarus-vhd-ransomware\/22422\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/lazarus-vhd-ransomware\/28813\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/lazarus-vhd-ransomware\/8652\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/lazarus-vhd-ransomware\/36559\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/lazarus-vhd-ransomware\/15384\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/lazarus-vhd-ransomware\/15827\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/lazarus-vhd-ransomware\/13727\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/lazarus-vhd-ransomware\/24801\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/lazarus-vhd-ransomware\/11764\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/lazarus-vhd-ransomware\/28892\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/lazarus-vhd-ransomware\/25748\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/lazarus-vhd-ransomware\/22658\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/lazarus-vhd-ransomware\/27923\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/lazarus-vhd-ransomware\/27753\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17096"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17096\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17097"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}