IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

'Bad Rabbit' ransomware found to be similar to NotPetya

Many antivirus tools can't recognise the malware spreading through Russia and Ukraine

Hacker in front of a Russian flag

A new strain of malware is spreading through organisations in eastern Europe, bearing a striking resemblance to the NotPetya ransomware that targeted users around the world earlier this year.

Dubbed 'Bad Rabbit', it has already hit government departments in Ukraine and Kiev's public transport system, although it has also targeted media outlets and news websites, including news agencies in Russia.

Initial analysis of the ransomware by security researchers yesterday found similarities between Bad Rabbit and the NotPetya ransomware, also known as ExPetr, which was widely considered to have been a state-sponsored variant of the Petya malware.

The Bad Rabbit ransomware uses the fairly common attack vector of fooling users into infecting themselves with malicious files masquerading as something legitimate, in this case an Adobe Flash installer.

The ransomware is able to slowly encrypt a user's files after it is installed, and, just like NotPetya, is able to schedule an automatic reboot of the system, which shuts down the computer.

Users are then presented with a near identical splash screen to that of NotPetya, that directs them to a Tor address where they are asked to pay out 0.05 Bitcoin (around $281) in exchange for a decryption key.

Bad Rabbit's website as seen on Kaspersky's blog

Researchers have already been successful at creating a 'vaccine' to inoculate against the ransomware, which involves creating a custom script that's able to block its ability to encrypt files. As with similar splash screens seen already this year, such as the WannaCry message, a countdown is displayed showing how long a user has left to pay the ransom until it goes up in price.

Both Kaspersky and Malwarebytes have said that the Bad Rabbit ransomware was likely created by the same author.

"Based on our investigation, this is a targeted attack against corporate networks, using methods similar to those used in the ExPetr attack. However, we cannot confirm it is related to ExPetr," said Kaspersky'sAlex Perekalin in a blog post.

"Whether it's possible to get back files encrypted by Bad Rabbit (either by paying the ransom or by using some glitch in the ransomware code) isn't yet known. Kaspersky Lab antivirus experts are investigating the attack, and we will be updating this post with their findings."

It's unclear how far the ransomware has spread, however Kaspersky has confirmed that most targets are thought to be based in Russia, including news agencies Interfax and Similar reports have emerged from Turkey and Germany, although it's too early to tell whether these are victims of this strain of ransomware.

Tony Rowan, chief security consultant at SentinelOne, said this latest strain demonstrates that hackers will continue to reuse old code as long as it proves effective.

"Indications are that this new variant continues to have success. Given that the propagation mechanism is based on EternalBlue [the Windows exploit patched back in March 2017, which both WannaCry and Petya used], it surprises me that so many people haven't patched their systems. Even more, they continue to rely on the legacy AV products which these types of malware evade so easily."

Virus Total, an online tool that analyses the capabilities of antivirus software, found that of 68 programs, almost half failed to correctly identify the file as malicious.

Security researchers continue to monitor the ransomware amid fears of yet another WannaCry and NotPetya style outbreak, attacks that crippled hundreds of thousands of computer networks around the world.

What is Bad Rabbit?

Bad Rabbit is a new strain of ransomware currently targeting eastern Europe and Russia. It's thought to contain similarities to the NotPetya ransomware, including a similar splash screen and encryption methods.

Who has been targeted?

So far two Russian news agencies, Ukraine's Ministry of Infrastructure and Kiev's public transport system are confirmed to have been hit. Odessa international airpot in Ukraine is also reporting issues, although it's unclear whether this is related. Kaspersky reports that the majority of targets are in Russia, although there are also a handful of infections in Turkey and Germany.

How does it spread?

The Bad Rabbit ransomware infects a machine through a malicious install folder, although it requires a user to manually click on a .exe file. So far there's no indication that the ransomware spreads passively.

Can it be stopped?

A quick vaccine has been found to be effective, but requires users to create a custom file that blocks the write permissions of the ransomware. However, once you're infected you have little choice but to pay the ransom or abandon the files.

Featured Resources

2023 Strategic roadmap for data security platform convergence

Capitalise on your data and share it securely using consolidated platforms

Free Download

The 3D trends report

Presenting one of the most exciting frontiers in visual culture

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

Leverage automated APM to accelerate CI/CD and boost application performance

Constant change to meet fast-evolving application functionality

Free Download


Ransomware now strikes one in 40 organisations per week, Check Point finds

Ransomware now strikes one in 40 organisations per week, Check Point finds

27 Jul 2022
Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022

Most Popular

What's powering Britain’s fibre broadband boom?
Network & Internet

What's powering Britain’s fibre broadband boom?

3 Feb 2023
Dutch hacker steals data from virtually entire population of Austria
data breaches

Dutch hacker steals data from virtually entire population of Austria

26 Jan 2023
Windows 10 users locked out of devices by unskippable Microsoft 365 advert

Windows 10 users locked out of devices by unskippable Microsoft 365 advert

3 Feb 2023