RobbinHood a very clever ransomware

This RobbinHood doesn't give a damn.. A lot security include tamper protection (tamper protection) which makes it very difficult to answer of the software, at least without leaving any traces.

The instant updates they also make it more difficult for malicious users to invade vulnerable systems because they close security vulnerabilities and cannot exploit them.

RobbinHood

Similarly, system services often keep their critical files in permanent use, meaning they cannot be easily deleted or modified, which prevents malicious users from destroying them with a ransomware.

But the best one wins… ..

This could be the difference between a ransom claim that you can not avoid paying, because everything is coded and you can not ignore it because all your important data does not exist and your business can not work. .

This is where RobbinHood malware comes in:

Malicious users have discovered a way that helps them bypass all of the above much more easily and gain access to any "secure" system. We wrote the safe with quotes because we consider it a very big tale for the security companies and the peb testers to get rich.

The owners of RobbinHood, instead of looking for vulnerabilities in the operating system and software of the system, just brought their own error!

The way it works is a fascinating story, told in great detail in a SophosLabs survey. If you want more technical details about the attack that we will describe (in a few words) below, see here.

In short, the scammers along with ransomware added an old but buggy Windows kernel driver.

The old driver is not malware, but it is an official software component of the Gigabyte motherboard, so it is digitally signed by the company. Of course the signature is certified as genuine by Microsoft itself.

So Windows will load the wizard because of the signature…

After that, everything is easy, as as we mentioned the driver may be genuine but it contains an error, which fraudsters can exploit to trick Windows into letting them upload their own, unsigned and malicious files!

And , gives them low-level access to the kernel, processes and system files, meaning they can kill programs they want and delete files that are normally locked.

Distorting kernel behavior on its own can cause a number of problems, such as programs that stop working properly, or corrupted data, or even BSoD.

But fraudsters do not care.

The moment you notice small problems, the already done, and if the computer is on a network, all systems will be locked. Meanwhile only the fraudster has the decryption key.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).