The only constant in life is change, particularly if any part of your life is spent trying to keep malware out of your organization. Malware developers are constantly mutating their delivery methods and the underlying malware behavior. Petya and Mischa ransomware, which were both described in recent BleepingComputer articles, are good examples of this constant change, but digging into the details of these examples raises some interesting ideas about how to strengthen your defenses against ransomware and other malware.
According to a BleepingComputer article from March, Petya ransomware initially targeted HR departments and was delivered in an email containing a Dropbox link to a ransomware installer disguised as an employment application. If the Petya installer was able to gain admin privileges on the victim’s computer, it would replace the computer’s master boot record and force a reboot to invoke a program which would encrypt portions of the victim’s hard drive, rendering the computer useless. A lock screen would then be displayed with instructions to make a ransom payment in Bitcoin in return for a decryption key.
In a more recent article from BleepingComputer, they described how the malware developers behind Petya recently morphed their approach. They still targeted HR departments by email, but the link to the ransomware installer (still disguised as an employment application) was to a different cloud storage app called MagentaCloud. The developers also added a second payload to the installer to install another ransomware program – Mischa – if it was unable to gain admin privileges on the victim’s machine. Mischa is a more common type of ransomware which scans a computer for specific file types and encrypts those files. After encryption, the computer still operates but access to these files is not possible. Text and HTML files are left behind containing instructions to make payment and decrypt the affected files.
Considering the changes that the Petya/Mischa developers made for their second version, what lessons can we take away?
Starting with the ransomware payload, the developers modified the installer to deliver two different ransomware va