{"id":20571,"date":"2018-07-06T05:00:43","date_gmt":"2018-07-06T09:00:43","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=20571"},"modified":"2019-11-15T22:33:54","modified_gmt":"2019-11-15T11:33:54","slug":"rakhni-miner-cryptor","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/rakhni-miner-cryptor\/20571\/","title":{"rendered":"Rakhni Trojan: To encrypt and to mine"},"content":{"rendered":"<p>We recently <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/cryptominers-almost-double\/22898\/\" rel=\"noopener noreferrer nofollow\">posted<\/a> that ransomware is giving way to <a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/miner-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">miners<\/a> at the top of the online threat rankings. In line with this trend, the Trojan ransomware Rakhni, which we\u2019ve been watching since 2013, has added a cryptocurrency mining module to its arsenal. What\u2019s interesting is that the malware loader is able to choose which component to install depending on the device. Our researchers figured out how the updated malware works and where the danger lies.<\/p>\n<p>Our products spotted Rakhni in Russia, Kazakhstan, Ukraine, Germany, and India. The malware is distributed mainly through spam mailings with malicious attachments. The sample that our experts studied, for example, was disguised as a financial document. This suggests that the cybercriminals behind it are primarily interested in corporate \u201cclients.\u201d<\/p>\n<p>A DOCX attachment in a spam e-mail contains a PDF document. If the user allows editing and tries to open the PDF, the system requests permission to run an executable file from an unknown publisher. With the user\u2019s permission, Rakhni swings into action.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2018\/07\/06053149\/180706-rakhni-screenshot-1.png\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20574\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2018\/07\/06053149\/180706-rakhni-screenshot-1.png\" alt=\"\" width=\"728\" height=\"403\"><\/a><\/p>\n<p><strong><\/strong><\/p>\n<h2>Like a thief in the night<\/h2>\n<p><\/p>\n<p>When it\u2019s started, the malicious PDF file appears to be a document viewer. First, the malware shows the victim an error message explaining why nothing has opened. Next, it disables Windows Defender and installs forged <a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/digital-certificate-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">digital certificates<\/a>. Only when the coast seems clear does it decide what to do with the infected device \u2014 encrypt files and demand ransom or install a miner.<\/p>\n<p>Finally, the malicious program tries to spread to other computers inside the local network. If company employees have shared access to the Users folder on their devices, the malware copies itself onto them.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Mine or encrypt?<\/h3>\n<p><\/p>\n<p>The selection criterion is simple: If the malware finds a service folder called Bitcoin on the victim\u2019s computer, it runs a piece of ransomware that encrypts files (including Office docs, PDFs, images, and backups) and demands a ransom payment within three days. Details of the ransom, including how much, the cybercriminals kindly promise to send by e-mail.<\/p>\n<p>If there are no Bitcoin-related folders on the device, and the malware believes it has enough power to handle cryptocurrency mining, it downloads a miner that surreptitiously generates Monero, Monero Original, or Dashcoin tokens in the background.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Don\u2019t be a victim<\/h3>\n<p><\/p>\n<p>To avoid getting infected by Rakhni and having real damage inflicted on your company, be very wary of incoming messages, especially ones received from unfamiliar e-mail addresses. If you\u2019re in any doubt at all about whether to open an attachment, don\u2019t. Also, pay close attention to operating system warnings: Don\u2019t run apps from unknown publishers, especially if the names sound similar to popular programs.<\/p>\n<p>In the fight against miners and cryptors in the corporate network, you won\u2019t go wrong by taking these measures:<\/p>\n<ul>\n<li>Train your information security staff and regularly check their know-how. If you need help with that, our experts can <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness\" rel=\"noopener noreferrer nofollow\">arrange<\/a> it for you.<\/li>\n<li>Make backup copies of sensitive data on a separate storage medium.<\/li>\n<li>Use reliable security solutions with behavioral analysis \u2014 for example, Kaspersky Endpoint Security for Business.<\/li>\n<li>Regularly <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/cybersecurity-services?redef=1&amp;THRU&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2b_kasperskydaily_lnk_______\" rel=\"noopener noreferrer nofollow\">probe<\/a> your corporate network for anomalies.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n<p>Even if you don\u2019t use Kaspersky Lab\u2019s corporate solutions, that\u2019s no reason to leave data to ransomware actors. We have a dedicated solution \u2014 the Kaspersky Anti-Ransomware Tool \u2014 that can augment the security products of most third-party vendors. It uses the latest behavioral detection technologies and our cloud mechanisms to hunt for ransomware.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.<\/p>\n","protected":false},"author":2484,"featured_media":20572,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2141,2620,1680,2917,261,2420,2619,2786,2918,2919,420,513,422,723],"class_list":{"0":"post-20571","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-business","10":"tag-cryptocurrencies","11":"tag-cryptors","12":"tag-dashcoin","13":"tag-encryption","14":"tag-endpoint","15":"tag-mining","16":"tag-monero","17":"tag-monero-original","18":"tag-rakhni","19":"tag-ransomware","20":"tag-social-engineering","21":"tag-threats","22":"tag-trojans"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rakhni-miner-cryptor\/20571\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rakhni-miner-cryptor\/13634\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rakhni-miner-cryptor\/11401\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rakhni-miner-cryptor\/15700\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rakhni-miner-cryptor\/13937\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rakhni-miner-cryptor\/13114\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rakhni-miner-cryptor\/16418\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rakhni-miner-cryptor\/15902\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rakhni-miner-cryptor\/20880\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rakhni-miner-cryptor\/5079\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rakhni-miner-cryptor\/22988\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rakhni-miner-cryptor\/10552\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rakhni-miner-cryptor\/9370\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rakhni-miner-cryptor\/17183\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rakhni-miner-cryptor\/20733\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rakhni-miner-cryptor\/16918\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rakhni-miner-cryptor\/20561\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=20571"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20571\/revisions"}],"predecessor-version":[{"id":24034,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/20571\/revisions\/24034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/20572"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=20571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=20571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=20571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}