Some Bad Rabbit Victims Can Recover Files Without Paying Ransom

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Some extremely lucky users will be able to recover files locked by the Bad Rabbit ransomware because of small operational mistakes on the part of the malware's authors.

These flaws were revealed today in an update to Kaspersky's Bad Rabbit report. Researchers from the Russian antivirus vendor say they were able to discover two mistakes in Bad Rabbit's modus operandi.

Bad Rabbit does not delete shadow volume copies
The biggest of these is that Bad Rabbit does not delete shadow volume copies, a technology included with the Windows OS that creates snapshots of files while in use.

Because ransomware works by creating a copy of a file, encrypting the copy, and deleting the original, all encrypted files are at point "in use" and a shadow volume is created on disk. These shadow (invisible) files are kept on disk for undetermined periods of time, based on the available free space.

Most ransomware families delete shadow volumes to prevent disk recovery software from finding copies of the original, unencrypted files.

According to Kaspersky, whoever created the Bad Rabbit ransomware did not create a routine to delete these files. While shadow volume copies won't guarantee victims can get back all their files, it at least allows them to recover some documents.
 

Fel Grossi

Level 13
Verified
Top Poster
Well-known
Jan 17, 2014
627
And now these criminals will do a version Bad Habbit 2 to fix those shadow volume "mistakes". :cautious:
 
  • Like
Reactions: XhenEd

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top