Bad Rabbit Pretending To Be Something You’re Not

Well, here we go again with a Ransomware hack spreading worldwide. While the names of the hacks are nothing short of juvenile creativity the havoc they wreak is not. And this Bad Rabbit is laying siege as a new strain of ransomware similar to NotPetya.

I received the news immediately from KnowBe4, which reported that it appears Bad Rabbit was introduced via files on hacked Russian media websites, using the popular social engineering trick of pretending to be an Adobe Flash installer. It started last Tuesday, October 30, freezing computer systems in several European countries. It then began spreading to the U.S.

According to KnowBe4, “Department of Homeland Security’s Computer Emergency Readiness Team issued an alert saying it had received “multiple reports” of infections.” In addition, Russia’s Interfax news agency tweeted that the outbreak had shut down some of its servers, forcing them to rely on its Facebook account to deliver news.

The Ransomware demands a payment of 0.05 Bitcoin, or about $275, from its victims. If you are a victim, though you may or may not be given access to your files even if you do pay. So far it isn’t clear whether they are releasing files. Victims also are given just 40 hours to pay.

Employees are typically the weakest link in a company. They often have easy to hack passwords and fall for phishing and social engineering attacks. You can initiate processes that enforce changing passwords frequently and encourage stronger passwords.

With a continuous onslought of attacks and the rapidly approaching GDPR deadline, Cyber security must be the number one priority of any company that does business internationally whether small, medium or large. If your business is not yet compliant with the GDPR, call our offices for a free consultation.