Email:

Phone No.

Whatsapp

FBI Exposes Weakness In Mamba Ransomware, DiskCryptor

  • Home
  • FBI Exposes Weakness In Mamba Ransomware, DiskCryptor
FBI Exposes Weakness In Mamba Ransomware, DiskCryptor
FBI Exposes Weakness In Mamba Ransomware, DiskCryptor
FBI Exposes Weakness In Mamba Ransomware, DiskCryptor
FBI Exposes Weakness In Mamba Ransomware, DiskCryptor
FBI Exposes Weakness In Mamba Ransomware, DiskCryptor

FBI Exposes Weakness In Mamba Ransomware, DiskCryptor

An alert from the U.S. Federal Bureau of Investigation about Mamba ransomware reveals a weak spot in the encryption process that could help targeted organizations recover from the attack without paying the ransom.

The FBI warns that Mamba ransomware attacks have been directed at entities in the public and private sector, including local governments, transportation agencies, legal services, technology services, industrial, commercial, manufacturing, and construction businesses.

Race to get the encryption key

Mamba ransomware (a.k.a. HDDCryptor) relies on an open-source software solution named DiskCryptor to encrypt victim computers in the background with a key defined by the attacker.

Also Read: The DNC Registry Singapore: 5 Things You Must Know

The FBI explains that installing DiskCryptor requires a system restart to add necessary drivers, which occurs with Mamba approximately two minutes after deploying the program.

The agency further notes that the encryption key and the shutdown time variable are stored in DiskCryptor’s configuration, a plaintext file named myConf.txt.

A second restart of the system happens once the encryption process completes, around two hours later, and the ransom note becomes available.

Because there is no protection around the encryption key, as it is saved in plaintext, the FBI says that this two-hour gap is an opportunity for organizations hit by Mamba ransomware to recover it.

“If any of the DiskCryptor files are detected, attempts should be made to determine if the myConf.txt is still accessible. If so, then the password can be recovered without paying the ransom. This opportunity is limited to the point in which the system reboots for the second time” – the FBI

The Mamba ransomware operation started to increase its activity with a new variant found in the second half of 2019. Despite not having an affiliate program, it was among the top threats.

In a report from Coveware, in the first quarter of last year Mamba was sitting in the top five ransomware threats led by REvil and Ryuk. This changed in the fourth quarter of 2020, although it continued to be a notable risk.

One peculiarity of Mamba ransomware is that it overwrite the disk’s master boot record (MBR), preventing access to encrypted files on the drive. This makes it more difficult to track the number of attacks since files cannot be analyzed through automated services like ID-Ransomware.

Also Read: How To Comply With PDPA: A Checklist For Businesses

The FBI provides the following details on artifacts that could help organizations detect a Mamba ransomware attack:

Key Artifacts
FilesDescription
$dcsys$Located in the root of every encrypted drive [i.e.
C:\$dcsys$]
C:\Users\Public\myLog.txtRansomware log file
C:\Users\Public\myConf.txtRansomware configuration file
C:\Users\Public\dcapi.dllDiskCryptor software executable
C:\Users\Public\dcinst.exeDiskCryptor software executable
C:\Users\Public\dccon.exeDiskCryptor software executable
C:\Users\Public\dcrypt.sys DiskCryptor software executable
C:\Windows\System32\Drivers\dcrypt.sysInstalled DiskCryptor driver
[Ransomware Filename].exePortable 32-bit .NET assembly compatible with 32-bit
and 64-bit Windows systems which combines
DiskCryptor with a simple ransom message upon boo
dcinst.exeCryptor installer support
dccon.exeConsole version od DiskCryptor
Services
myCryptoraphyServiceRuns [Ransomware Filename].exe as a service and is removed once encryption is completed

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us