Babuk Ransomware
About Babuk Ransomware
The group behind Babuk have openly expressed their hatred towards BlackLivesMatter (BLM) and LGBT communities. It supports command line operation and make use of the embedded three different built-in commands to spread itself and encrypt the network resources. It always checks the pre-running processes and services beforehand to kill a predefined list and avoid detection.
Techniques Used
Babuk generally uses phishing emails to intrude into a network. The attackers send an email to the victim disguised as a legitimate one, containing a malicious link. Once the attachment is opened, the malware downloads into the system. These attacks also try to exploit the vulnerabilities of a system like an unpatched software or use brute force attacks to guess passwords.
Once the system is corrupted, the ransomware starts encrypting the files with strong encryption algorithms. After that, they demand ransom in exchange for a decryption key. They can also steal sensitive data of the victim and threaten to leak it to the public if the ransom is not paid.
Prevention
- Mandatory strong password policies and multi-factor authentication for all critical services.
- Use updated or modern Identity and Access Management (IAM) tools.
- Employ advanced endpoint security products on all endpoints.
- Regularly update all the software and operating systems.
- Have the least privilege approach to security, including the removal of all the unnecessary access to administrative shares and other services.
- Administer a solid backup strategy including offline, encrypted, and immutable backup of data.
Comments
Post a Comment