Breaking

RobbinHood ransomware is back through Gigabyte exploit and can shutdown endpoint security applications

Security researchers at Sophos, have identified a new ransomware variant of RobbinHood that is exploiting a vulnerability in motherboard manufacturer Gigabyte’s driver. Though this vulnerability was reported by a reporter in 2018, as CVE-2018-19320 the Gigabyte ignored the report and responded that there were no vulnerabilities in their drivers. However, later that vulnerable driver was discontinued. But the driver still exits and the vulnerability is not patched in the manufactured motherboards yet. 

Understanding the criticality of this vulnerability, attackers have developed a new Robbinhood variant which is capable of removing the endpoint security applications before getting itself installed to a system. The mere adaption of endpoint security products is to detect malware but this threat appears to create a new challenge for endpoint protection.

RobbinHood Ransomware Note

Five key files of this ransomware variant

The variant has multiple files which will trigger the removal of endpoint security applications. The key file is STEEL.EXE which will kill the security applications, followed by ROBNR.EXE installing the driver installer, while GDRV.SYS (Gigabyte kernel driver) and RBNL.SYS will install the vulnerable and malicious drivers. And finally the PLIST.TXT file will list the processes and files to be destroyed. This Anti-Virus bypassing method works with Windows 7, Windows 8 and Windows 10.

After successfully blocking the anti-virus using STEEL.EXE and removing all the files using PLIST.TXT, the ransomware can now encrypt all the data in the infected system without any detection or hindrance. The attacker brings his own vulnerability and deploys it into the targeted system, so even if the system is completely patched and updated, it can still become victim to this RobbinHood ransomware variant.

How to defend against this new Gigabyte exploit

In recent times, ransomware employ multiple attack strategies to infiltrate a network or system, it is important for the users to adapt to multiple security strategies to disrupt the attack workflow of the ransomware before it accomplishes its task completely. It is important to adopt multiple technologies, security layers and integration of public cloud in the cyber strategies.

Organizations and users need to practice cyber hygiene by employing MFA, strong passwords, limited user privileges, safeguarding their data by following the 3-2-1 rule of backups, enable RDP only when it is required and above all enable tamper protection to prevent malware from shutting down the endpoint security applications.

Above all, investing in cyber education for employees, clients and staff should be mandatory. 

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago