Here’s one for the books: ransomware that’s disguised as a free anti-ransomware decryption tool.
The sample we looked at claims to be a decryptor for the DJVU ransomware, which gets its name from the .djvu
extension it appends to files that it’s just scrambled.
You’re invited to put in your “personal ID” and a file extension, presumably to give the program a veneer of legitimacy, but as far as we can see it ignores what you enter, using the dialog simply as a launcher for the encryptor-within-the-bogus-decryptor.
If fact, the fake decryptor simply extracts a copy of another program called crab.exe
(not to be confused with the GandCrab ransomware family) that’s embedded inside it as a data resource .
The fake decryptor writes crab.exe
to your TEMP folder, launches it and then deletes itself.
The crab.exe
file is unreconstructed ransomware: it goes through your files looking for matches against a long list of file extensions to encrypt, and scrambles them with a randomly-chosen encryption key.
The extension .djvu
, added by the very ransomware that this double-crossing malware claims to be able to fix, is on the list.
So if you are running this in the desperate hope that you might be able to recover from one ransomware attack for free…
…you’ll end up in a double-whammy situation, with any files that DJVU didn’t yet attack scrambled once, and with any already-encrypted files now scrambled twice.
This malware uses the extension .ZRB
, so doubly-encrypted files will now end .djvu.ZRB
After the scrambling finishes, your Windows wallpaper is set to a black background for dramatic effect, and a file called --DECRYPT--ZORAB.txt
is added to your desktop to tell you what to do next:
There’s no price shown here, no web page to visit, and no cryptocoin wallet to send any funds to, just a “personal ID” and a pseudo-anonymous ProtonMail email address that supposedly puts you in touch with the crooks.
Note that by simply changing a few text strings in their malware and recompiling it, these crooks could easily turn it into a variant that claims to “fix” other ransomware strains – it’s just the window title and the .djvu
extension string that target this sample at DJVU victims.
We’re guessing that DJVU was targeted this time because early versions of that malware could be decrypted for free, but it seems that the DJVU crooks made some recent “improvements” to make it harder to unscramble without paying.
As a result, we assume that at least some victims might now be willing to search outside their usual comfort zone for free tools that claim to help, given that the reputable ones they’ve already tried didn’t work.
For what it’s worth, the crab.exe
scrambler didn’t seem very well programmed – in our tests it failed to scramble some files for reasons that could easily be avoided (we shan’t say why- we’ll leave the crooks to find the bug for themselves), and in some directories it managed to scramble its own --DECRYPT--ZORAB.txt
ransom note shortly after creating it.
It did, however, scramble its own ransom note.
What to do?
We don’t know how this particular sample was distributed, or how many people have run it, but if you have been the victim of one ransomware attack already, please don’t let your guard down in your search for a free tool to recover…
…only to find out you’ve made a bad thing worse.
Ransomware isn’t only about attacks on big companies and corporate networks.
At home, you can protect yourself with some simple precautions:
- Don’t open unexpected attachments, especially on the say-so of the email itself, which could have come from anybody and probably did.
- Don’t click through to unexpected web links or download software you didn’t ask for just because someone you don’t know told you to.
- Get your patches and security updates as soon as you can. Don’t make it easy for the crooks by leaving yourself open to attacks that you could have prevented.
- Look for an anti-virus that includes a real-time filter to stop malicious behaviour before it does any harm, plus a built-in web filter to keep you away from hacked or harmful sites.
- If you’re stuck, ask someone you know and trust instead of hunting further and further afield online on your own.
- Make regular backups so you have a fighting chance of recovering lost or damaged files on your own.
Both the fake decryptor and the ransomware it contains are blocked by Sophos products as Troj/Ransom-FYU. Other names you may hare for this threat include Zorab (the name it gives itself) and Zorba, an anagram of that.
Latest Naked Security podcast
LISTEN NOW
Click-and-drag on the soundwaves below to skip to any point in the podcast. You can also listen directly on Soundcloud.
Bryan
Ransomware scrambling its own ransom note.
As if lately we haven’t seen enough examples of the it-would-be-funny-without-the-disturbing-aspect genre.
Tip
Make offline backups that don’t connect to any part of your network or computer system. Crooks can’t encrypt what they can’t see or physically access.
Me
Something like a Blu-ray?
Tip
Or just use read-only media. Probably with a physical switch to change modes and not a software switch.
Paul Ducklin
A USB drive can be write-protected simply by unmounting it, unplugging it and putting it in your drawer. (Do encrypt your backups – on Mac you have FileVault and APFS, on Linux you have LUKS, on Windows there is BitLocker, though AFAIK you can’t use BitLocker on anything but your primary hard disk unless you have a business version of Windows, and there are numerous free, open-source archiving tools that can do AES encryption on all those OSes.)
Raffles
If I backup with Timeshift (Linux), do I then encrypt the backup with LUKS?
Paul Ducklin
I’m afraid I’m not sure – I’ve never used Timeshift.
The deal with LUKS is that you can create an encrypted partition on a removable drive so everything you write to it is encrypted on write and decrypted on reading back (you have to put in the password to mount the device), giving you what’s called Full Disk Encryptiob. So even if Timeshift encrypts the data it copies across, the LUKS device is itself encrypted too (you can use a different password).
For any USB stick I don’t intend to use for transfering files to anyone else, I always LUKSify it with cryptsetup first (just like I do the root partition on my internal disk) so that even plaintext files I copy onto it end up encrypted afterwards. For files such as password vaults which are encrypted with their own password, those end up doubly-encrypted. That way if I ever lose the USB stick, I don’t have to wonder whether I had copied any unencrypted files to it, even if I never intended to.