- Don't run Flash
- Use strong passwords
The sites that were distributing the malware were not responsible for the attack. They were themselves victims of a previous attack intended to set up this one. If a security researcher determined that they had received malware from one of these sites and launched a counter attack to take it down, they would be attacking another victim rather than the real perpetrator. In view of the relatively narrow geographic and industry targeting it is likely that this attack is politically motivated rather than simple extortion. As of the time of writing, there do not appear to be any ransom payments made to the bitcoin wallets associated with this attack. The attack would have been much more devastating if the original watering holes had been more widespread. Ransomware as a threat is not going away, and though this may have come from a nation state actor, the barriers to entry are getting lower. Luckily the defenses are getting better as well. Microsoft has introduced a new Windows Defender feature called Controlled Folders which is intended to give additional protection against ransomware. It is currently disabled by default, and may not protect against all attacks, but it is a good start. Over time I expect that Microsoft will win the battle against ransomware on the Windows platform. Here are some links for further information on BadRabbit. If you liked our headline, you'll love The Register's#BadRabbit was spread via web traffic from compromised media sites. #infosec #ransomware #cryptor pic.twitter.com/7GPsgZ2s3A
— Group-IB (@GroupIB_GIB) October 24, 2017