Researchers Claim Petya Outbreak Was Disguised Wiper Attack

The June 27 Petya outbreak may have been instigated by "wiper" malware that was disguised as ransomware, and possibly it was unleashed by a state actor.

At least that's the assessment coming from Microsoft Most Valuable Professional Matt Suiche of Comae Technologies and Juan Andres Guerrero-Saade of Kaspersky Lab. The two presented their findings in a Web presentation today that was described as being available on demand.

A wiper is different from ransomware in that the intent is to destroy the data on the disk. It's not typically used to extract money from victims because ransomware attackers typically want to maintain a certain level of trust with their victims that the data can be decrypted, the researchers argued.

Their analysis focused on the key that gets presented on screen to the victim. It's randomly generated, unlike the key in a Readme.txt file dropped by the malware, meaning that there is no way for the perpetrators to decrypt the victim's files, even if the victim pays the $300 Bitcoin ransom. Suiche said that "the delta" between the "installation" key from the Readme.txt and the boot screen showed there was no intent from the attacker to provide decryption keys.

The Petya variant encrypts files (AES128) up to the first megabyte. It replaces the Master Boot Record and displays a fake identifier or "installation" key, the researchers said.

Suiche compared the modified Petya ransomware in this attack with the Petya ransomware used in 2016. The earlier version of the malware had correctly generated a key that could decrypt data. However, the method of generating the key in this instance of the Petya malware appears to contain "a logic bug," he said.

The two researchers questioned the notion that the perpetrators were just incompetent or "script kiddies," even though they made some fundamental ransomware mistakes, such as using a single e-mail address for their victims to use, which got shut down in hours' time, and using a single Bitcoin wallet. The attackers had used a mimikatz variant to steal administrator credentials, so they weren't unsophisticated, Suiche argued.

At this point, no viable solution has been found to decrypt the encrypted files. Paying a ransom won't work, since there's no workable decryption key and the mailbox for communication with the attackers has been shut down. For those who did pay, Bitcoin won't refund their money, the researchers explained.

The researchers suggested that state actors may be involved because of the concentration of attacks in the Ukraine, noting that Microsoft confirmed that the MEDoc tax accounting software was used as part of the initial infection. The use of MEDoc as a vector also was confirmed by Cisco and Kaspersky Lab. Guerrero-Saade said that upwards of 60 percent of the distribution happened in the Ukraine, and it was seen concentrated next in Russia. He added that a "watering hole attack" had occurred at a Ukrainian news agency site, but it had served up 30-KB variant of the malware with no spreading capabilities.

Guerrero-Saade said the malware's spread using the MEDoc software is an important detail to note because there's been "mistaken reporting" about this exploit spreading through Word documents and that people shouldn't opened attached files. He said that he didn't think that was the case. The main vector was the watering hole, he added.

Microsoft, when asked today about this technical analysis that the Petya variant was a disguised wiper, indicated via e-mail that it had "nothing to share on the matter."

Suiche provided his technical analysis in this Comae Technologies post, where he stated that the Petya variant as ransomware was just "a lure for the media." Kaspersky Lab provided its technical analysis here, calling the Petya variant a "wiper pretending to be ransomware."

Microsoft did release patches for the SMB 1 exploit used by the attackers, namely MS17-010 in March and KB4012598 on May 14 (for older Windows systems), addressing EternalBlue and EternalRomance attack flaws. However, generally speaking, this attack opened up questions about how Active Directory is used in organizations. In particular, segmentation should be up for broad discussion in the security space to limit the spread of stolen credentials, Guerrero-Saade explained.

Enterprises shouldn't be blamed for not having patches up to date because of the complexity of patching, Guerrero-Saade said. In this case, one vulnerable machine was enough to spread the malware across a domain. He advised having backup capabilities in place to address both ransomware and wipers, and these backup systems shouldn't be connected to a network's machines. If they do get connected to infected machines, they also will be wiped, he said.

Guerrero-Saade recommended blocking incoming traffic to TCP Port 445 if that's possible. Organizations should use a modern antimalware solution with strong heuristics in order to understand what the malware is doing to machines. He added that Kaspersky Lab offers a free anti-ransomware tool for use by organizations.

About the Author

Kurt Mackie is senior news producer for the 1105 Enterprise Computing Group.


  • Gears

    Top 10 Microsoft Tips and Analyses of 2018

    Here are the year's most popular explainers and how-to columns -- along with some plain, old "Why did Microsoft do that?" musings thrown in.

  • Sign

    2018 Microsoft Predictions Revisited

    From guessing the fate of Windows 10 S to predicting Microsoft's next big move with Linux, Brien's predictions from a year ago were on the mark more than they weren't.

  • Microsoft Recaps Delivery Optimization Bandwidth Controls for Organizations

    Microsoft expects organizations using its Delivery Optimization peer-to-peer update scheme will optimally see 60 percent to 70 percent improvements in terms of network bandwidth use.

  • Getting a Handle on Hyper-V Virtual NICs

    Hyper-V usually makes it easy to configure virtual network adapters within VMs. That is, until you need to create a VM containing multiple virtual NICs.

comments powered by Disqus
Most   Popular

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.