Special thanks to Asher Langton and Craig Dods for their assistance in this rapid response.
Juniper Networks is aware of a new variant of the Petya malware family. The malware combines a number of existing techniques to spread across vulnerable clients. We have begun the process of analyzing today’s samples of Petya in the lab and can report that we are able to detect and prevent infection using our SkyATP and IDP technologies. Juniper will continue to update this blog as additional information becomes available.
The Petya family of malware is not new and one of our researchers previously blogged about this malware in the past. This ransomware is available to cybercriminals to purchase as a service rather than developing their own malware.
The ransomware demands that the infected user can only recover their data by paying a ransom of the equivalent of $300 worth of bitcoins. It’s important to note that no payments thus far have resulted in successful decryption (source: Posteo blog).
How the malware spreads.
This latest variant uses three primary means of attack to spread:
Once executed, the infected computer attempts a connection to 18.104.22.168/myguy.xls which is a MS HTA file. This results in connection to french-cooking[.]com that downloads and drops another executable (myguy.exe, saved) on the local system <random>.exe, where <random> is a random number between 0 and 65535).
Once infected, the ransomware will attempt to use the second vector, using MS017-010 (Windows SMB Remote Code Execution Vulnerability) using the 'ETERNALBLUE' exploit - a network based vector to spread across internal networks - the same vulnerability used by the recent 'WannaCry' malware.
The malware appears to leverage Windows WMI (Microsoft Windows Management Interface) to spread across internal networks if administrative credentials are available.The method of privilege escalation and/or credential theft that facilitates this is still being researched.
As more details become available, we will update this post.
Impact of infection.
Initially, it appeared that this ransomware might have centered its efforts on targets in the Ukraine via accounting software, though more recent reports seem to confirm that it is also affecting systems in Spain, France, Russia and India. Indeed, more organisations across the globe may be affected as governments and businesses around the world find themselves locked out of their own machines.
This malware is more malicious than most varieties of Ransomware, in that Petya does not just encrypt files on a targeted system one by one - it also encrypts the hard drive's master file table (MFT) which renders the master boot record (MBR) useless and the system unable to boot.
On rebooting the infected system, the ransomware displays a fake CHKDSK error, whilst it’s encrypting the system.
Whilst appearing to be a CHKDSK process, it's actually encrypting the system.
However, the Petya ransomware has actually replaced the system’s MBR with custom malicious code that displays a ransom note, leaving the device unable to start:
Petya encrypts the whole system, not just individual files.
Note that once the infected system has been rebooted, it is no longer trying to spread the infection (as the infected computer stops booting) and thus is likely to spread much slower than the WannaCry ransomware.
How Juniper protects.
For Juniper SRX and IDP customers, MS17-010 is covered by multiple CVEs and their corresponding signatures. You should ensure the following IDP signatures are enabled in your environment.