The world is digitally transforming into an absolutely prodigious place. The more we move towards a digital living, the more we are prone to digital attacks and these seem to be never-ending. Earlier this year was WannaCry ransomware, PETYA and now the BAD RABBIT.

This Bad Rabbit is a ransomware and seems to be from the same makers of Petya, but geared more towards financial benefits. The Petya was an attack which was unrecoverable whereas the BAD RABBIT promises to provide access back to your data if the demanded financial benefits are processed.

Protect Your Data with BDRSuite

Cost-Effective Backup Solution for VMs, Servers, Endpoints, Cloud VMs & SaaS applications. Supports On-Premise, Remote, Hybrid and Cloud Backup, including Disaster Recovery, Ransomware Defense & more!

The BAD RABBIT has made Russia, Ukraine and few other eastern European countries to fall as its prey. An infected file application which is presented, as legitimate as an ordinary file have struck some news agencies, train stations, and airports in the above-mentioned countries. Some media websites have been hacked and infected links are uploaded. The users on the website were asked to install a fake Adobe Flash Update as a result of which the virus attacks the user’s system. No exploits were utilized but the users manually invited the threats themselves by launching the install_flash_player.exe file in their systems.

Now the user loses access to all his/her data as it encrypts your files using DiskCrypto (Software). When you try opening your files, it has no longer access and when you Reboot your system, a tor page opens with the following message. The normal boot-up is restricted as it also installs itself the modified Bootloader which prevents this action.

Oops! Your files have been encrypted.

Download Banner

If you see this text, your files are no longer….

We guarantee that you can recover all your files….

Visit our web service at caforssztxqzf2nm.onion

Your personal installation key#1:

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

If you already got the password, please enter it below.
Password#1: _

These encrypted files can be recovered only with the Decryption Password from the makers of Bad Rabbit ransomware once you make the payment of demanded financial benefits which in this case are the bitcoins. 0.05 bitcoins approximately about $285 is the initial demand which kept increasing if the payment was not processed before the allotted time.

In addition to encrypting your files, the Bad Rabbit possesses the ability to spread through the network. Thereby the other system connected in your network are prone to get affected. The makers of Bad Rabbit have efficiently worked out the attack. It uses some hardcoded default Network shared Passwords which protects the Encryption generated using CryptGenRandom.

The irony is quite interesting – cyber security awareness month celebrated this October witnessed a terrific cyber attack in spite of so many cognizance regarding these type of attacks. Yesterday it was PETYA, today it is BAD RABBIT and tomorrow it will be something new. Yet again the cyber attack education lacks amongst many business organizations. The attacks are getting unique, bigger and better but are you ready to face them?

It is now an urgent need for every business organization to call for a trusted backup solutions. When these attacks have now become inevitable, at least making sure to recover from the attacks without payment of ransoms must be initiated immediately. This can be made possible with data backups. Many backup solutions are available in the market but very few rendering the promised efficiency and recovery.

Vembu is one such Backup solution with multiple configuration options and efficient features enabling its customers the best of backup experience. With Vembu BDR Suite, recover your data from all types of cyber threats and disasters thus not surrendering your money to such criminal hackers.

Conclusion

When every business organization will protect its data through the backup solutions, there will be no point for these cyber hackers to generate these type of viruses as they will be of no beneficiary. The attacks made for demanding ransom will thus terminate when organizations can recover their encrypted or hacked data with backup solutions even after these infectious virus attacks.

Interested in trying Vembu BDR suite? Try Now on a 30-days free trial: https://www.bdrsuite.com/vembu-bdr-suite-download/

Got questions? Email us at: vembu-support@vembu.com for answers.

Follow our Twitter and Facebook feeds for new releases, updates, insightful posts and more.

Rate this post