Breaking

RobbinHood ransomware is back through Gigabyte exploit and can shutdown endpoint security applications

Security researchers at Sophos, have identified a new ransomware variant of RobbinHood that is exploiting a vulnerability in motherboard manufacturer Gigabyte’s driver. Though this vulnerability was reported by a reporter in 2018, as CVE-2018-19320 the Gigabyte ignored the report and responded that there were no vulnerabilities in their drivers. However, later that vulnerable driver was discontinued. But the driver still exits and the vulnerability is not patched in the manufactured motherboards yet. 

Understanding the criticality of this vulnerability, attackers have developed a new Robbinhood variant which is capable of removing the endpoint security applications before getting itself installed to a system. The mere adaption of endpoint security products is to detect malware but this threat appears to create a new challenge for endpoint protection.

RobbinHood Ransomware Note

Five key files of this ransomware variant

The variant has multiple files which will trigger the removal of endpoint security applications. The key file is STEEL.EXE which will kill the security applications, followed by ROBNR.EXE installing the driver installer, while GDRV.SYS (Gigabyte kernel driver) and RBNL.SYS will install the vulnerable and malicious drivers. And finally the PLIST.TXT file will list the processes and files to be destroyed. This Anti-Virus bypassing method works with Windows 7, Windows 8 and Windows 10.

After successfully blocking the anti-virus using STEEL.EXE and removing all the files using PLIST.TXT, the ransomware can now encrypt all the data in the infected system without any detection or hindrance. The attacker brings his own vulnerability and deploys it into the targeted system, so even if the system is completely patched and updated, it can still become victim to this RobbinHood ransomware variant.

How to defend against this new Gigabyte exploit

In recent times, ransomware employ multiple attack strategies to infiltrate a network or system, it is important for the users to adapt to multiple security strategies to disrupt the attack workflow of the ransomware before it accomplishes its task completely. It is important to adopt multiple technologies, security layers and integration of public cloud in the cyber strategies.

Organizations and users need to practice cyber hygiene by employing MFA, strong passwords, limited user privileges, safeguarding their data by following the 3-2-1 rule of backups, enable RDP only when it is required and above all enable tamper protection to prevent malware from shutting down the endpoint security applications.

Above all, investing in cyber education for employees, clients and staff should be mandatory. 

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

1 week ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

2 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

2 weeks ago

Scalefusion MDM Alternatives: Top 5 Scalefusion Alternatives for IT Decision Makers

Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…

2 weeks ago

Okta Vs OneLogin: A Detailed Comparison

Compare Okta and OneLogin: a detailed guide on features, pricing, customer base, security, and more…

2 months ago