Security researchers at Sophos, have identified a new ransomware variant of RobbinHood that is exploiting a vulnerability in motherboard manufacturer Gigabyte’s driver. Though this vulnerability was reported by a reporter in 2018, as CVE-2018-19320 the Gigabyte ignored the report and responded that there were no vulnerabilities in their drivers. However, later that vulnerable driver was discontinued. But the driver still exits and the vulnerability is not patched in the manufactured motherboards yet.
Understanding the criticality of this vulnerability, attackers have developed a new Robbinhood variant which is capable of removing the endpoint security applications before getting itself installed to a system. The mere adaption of endpoint security products is to detect malware but this threat appears to create a new challenge for endpoint protection.
The variant has multiple files which will trigger the removal of endpoint security applications. The key file is STEEL.EXE which will kill the security applications, followed by ROBNR.EXE installing the driver installer, while GDRV.SYS (Gigabyte kernel driver) and RBNL.SYS will install the vulnerable and malicious drivers. And finally the PLIST.TXT file will list the processes and files to be destroyed. This Anti-Virus bypassing method works with Windows 7, Windows 8 and Windows 10.
After successfully blocking the anti-virus using STEEL.EXE and removing all the files using PLIST.TXT, the ransomware can now encrypt all the data in the infected system without any detection or hindrance. The attacker brings his own vulnerability and deploys it into the targeted system, so even if the system is completely patched and updated, it can still become victim to this RobbinHood ransomware variant.
In recent times, ransomware employ multiple attack strategies to infiltrate a network or system, it is important for the users to adapt to multiple security strategies to disrupt the attack workflow of the ransomware before it accomplishes its task completely. It is important to adopt multiple technologies, security layers and integration of public cloud in the cyber strategies.
Organizations and users need to practice cyber hygiene by employing MFA, strong passwords, limited user privileges, safeguarding their data by following the 3-2-1 rule of backups, enable RDP only when it is required and above all enable tamper protection to prevent malware from shutting down the endpoint security applications.
Above all, investing in cyber education for employees, clients and staff should be mandatory.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…