If youâ€™re familiar with Ransomware, you know its organized crime. Hackers target your precious data, encrypting and locking it behind a passkey only they have. You pay the ransom, you get the key and your data back.
Usually, itâ€™s in the hackerâ€™s best interest to follow through. They donâ€™t want word to get around that they donâ€™t return your data. Itâ€™s bad for business; and thatâ€™s what it is, a business.
However, the latest ransomware on the block, â€˜Petyaâ€™, flies in the face of this concept. Not only is it more malicious than all the crypto-extortion programs before it, it sometimes doesn’t even help to pay.
Hereâ€™s how Petya traditionally works:
A Trojan CV
The standard infection scenario currently looks like this; you or one of your staff receives an e-mail pretending to be a job application. The e-mail contains a Dropbox link to a zip file which pretends to be their resume, typically containing:
- A photo of a young man claiming to be an applicant. In fact, this is a common stock image.
- A fake resume that is really a malicious EXE, either in a self-extracting archive or fake PDF file.
When you click on the CV, you receive a Blue Screen of Death instead. Thatâ€™s all it takes to start Petyaâ€™s ball rolling.
A Pop-Up Alert
Petya doesnâ€™t even attempt to bypass your user account control (UAC) and get your Administrator privileges. Youâ€™ll receive this pop-up alert instead:
In the past, if you hit â€˜noâ€™, the Petya infection would stop its infection routine. But Petya is evolving. Now, if you hit no it installs another ransomware program, dubbed â€˜Mischaâ€™, which begins to encrypt your files directly in an operation that doesnâ€™t require special privileges. There is currently no way to restore files encrypted by Mischa without paying the ransom.
So youâ€™re damned if you do, damned if you donâ€™t.
Letâ€™s say you hit â€˜Yesâ€™, and end up running Petya instead of its less-sophisticated cousin, Mischa. When you do, the the system crashes. When it restarts, Petya puts up the following screen, pretending to be running a CHKDSK scan:
Donâ€™t be fooled; this is Petyaâ€™s attempt to buy time as itâ€™s already encrypting your data, trying to trick you into not pulling the plug on your machine. If youâ€™re unfortunate enough to let it run to completion, youâ€™ll be greeted with a blinking screen with this ASCII art:
Pressing any key after this leads to the main screen with the ransom note, the information necessary to reach the web panel and proceed with the payment:
Currently Petya asks for around 0.99 bitcoins and Mischa asks for 1.93â€”thatâ€™s around US $430 and $875 respectively. Why you have to pay twice as much for Mischa is anyoneâ€™s guess.
What makes it different?
Petyaâ€™s infection method isn’t new. What is new is how it goes about it. Common ransomware usually encrypts certain kinds of filesâ€”pictures, office documents, etcâ€”and leaves your operating system unharmed so you can pay the ransom.
Not so with Petya. Instead, it blocks access to your entire hard drive, infecting your Master Boot Record (MBR). In layman’s terms, your MBR is what runs before an operating system like Windows, and by doing this it ensures it gets to run its malicious code first.
Worse news? It does this completely offline. That means you canâ€™t unplug your internet and hope to halt the process. In fact, you’ve got to find another computer in order to pay the ransom and get your data back.
Thatâ€™s an incredibly odd move, like kidnapping a family member but also your car keys. In the end, itâ€™s just going to make it that much harder to get the ransom money.
Even if you pay, your data may be lost
To pay the ransom, youâ€™ll need to head to the â€˜Dark Webâ€™, the seedy underbelly of the regular internet. There, you have to pay them in Bitcoins, which is the favoured currency of the webâ€™s black market.
The really bad news is, the decryption process is likely to catastrophically fail. The reason is the malware makes incorrect assumptions about the layout of your disk. That means the malware canâ€™t unscramble your data.
Given the abysmal rate of data recovery software at recovering your data, that may mean itâ€™s gone permanently with the single click of a CV attachment.
Prevention is the best cure
If youâ€™ve lost your data, you can pay the ransom and hope the decryption works, try your hand at recovering it, or wait until proper countermeasures and decryption tools are made by software security giants. But none of these are sure things, and all of them take time and money. And you can expect to see a lot more of Petya and Mischa, since theyâ€™re now even being offered as Ransomware-As-A-Service:
The best solution by far is prevention, whether itâ€™s before you’ve been hit or after. Having regular backups means that your data isnâ€™t lost, and performing a bare-metal restore of your hard disk. A restore isn’t possible, since youâ€™ll need to fully format your drive in order to purge the virus.
Using a reliable backup solution like BackupAssist along with a proper backup strategy (E.g.Â The 3-2-1 Backup Rule) means you donâ€™t need to pay hackers if youâ€™re hit with ransomware, or any other data disaster. Pairing this with an effective anti-virus solution is your best bet against malware.