Sophos News

Bad Rabbit Ransomware Outbreak

As you know, Bad Rabbit ransomware is working its way through Russia, the Ukraine and other parts of Europe. Sophos is tracking the threat and will keep you updated as we learn more about the attack.

In the meantime, please feel free to use this commentary from Sophos:

“It was only a matter of time before someone took the ideas from WannaCry and NotPetya and ran with them for another go at unsuspecting victims. It appears this latest variation, the so-called Bad Rabbit ransomware, is being distributed via a fake Adobe Flash Player installer file. Initial reports are primarily from Eastern Europe, especially focused on Russia and Ukraine. What makes this malware more dangerous than your typical ransomware being distributed in a similar manner is its ability to spread across an organization as a worm and not just through email attachments or vulnerable web plugins. It is rumored to contain the same password stealing and spreading mechanism as NotPetya, allowing it to traverse an enterprise and cripple it in no time.

SophosLabs are working to confirm these details, but have already ensured protection for Sophos customers. At the moment Sophos Anti-Virus customers will detect this variation as Troj/Ransom-ERK. Sophos Sandstorm proactively detected this threat through our machine learning detection as well as Sophos Intercept X blocking this threat through the use of our CryptoGuard technology. Sophos web protection products are also blocking known distribution points. We will publish further details as they are known.

In addition, Sophos recommends the following:

Please attribute to Chester Wisniewski, principal research scientist, Sophos.

If you would like an interview to discuss Bad Rabbit further or for ongoing updates, let us know. We can arrange a phone call or email Q&A with a Sophos security advisor.

Please refer to the NakedSecurity article here: Bad Rabbit Ransomware Outbreak.  Please also check back to this article for updates.

Sophos Benelux