Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye

  /     /     /  
Publicated : 22/11/2024   Category : security


Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye


Experts discuss the methods and targets involved in this weeks massive malware outbreak to figure out what motivated attackers.



This weeks massive ransomware outbreak has left security experts grappling to understand the who and why behind the attack, which mostly affected organizations in Ukraine and also reached businesses in an estimated 60 countries.
The malware at work is going by several names. Many researchers, noting similarities with the Petya malware, have simply declared this malware Petya. Others call it NotPetya. Some call it GoldenEye, which is a variant of Petya. Kaspersky Lab found similarities with a Petya modification called PetrWrap, and has dubbed it ExPetr.
Experts are piecing together the many updates and findings about this malware to figure out what happened.
Its really, really hard right now to identify motivation, says Adam Kujawa, head of malware intelligence at Malwarebytes. A lot of the security industry is struggling to figure out whats going on and why its happening.
However, a few findings could help determine the motivation behind this attack:
Ukraine was a target
All of its many nicknames refer to the same malware, which has been largely wreaking havoc through MeDoc, an accounting software primarily used in Ukraine. Analysis indicates MeDocs update server was compromised and as a result, any machine running the software would be hit with malware during an automatic update. From there, it rapidly spreads to other machines.
MeDoc is required software in Ukraine, an interesting and critical point in discussing the attackers motivations. Some reports
state
the countrys computer infrastructure was likely the primary target.
Travis Farral, director of security strategy at Anomali, says its interesting that this malware only spreads within an organization and not outside it. It could cripple organizations in Ukraine; in most cases, the outside companies affected either did business in Ukraine or worked with third parties that did business there.
One could make the argument that they wanted to limit it to Ukrainian institutions because they had no mechanism to go beyond this targeting, he explains. Anyone running the software is at risk.
This was never about money
It doesnt appear financial gain was the intent, Kujawa says. A lot of analysis has come to light saying it wouldnt be possible to decrypt the files anyway.
The malware overwrites the Master Boot Record (MBR) and encrypts individual files matching a list of file extensions. It requests $300 in Bitcoin to decrypt the system but despite an
estimated
$3,000 in payments, there has been no record of victims successfully decrypting their files.
While the malware is technically based on ransomware, Kujawa describes it as wearing a ransomware costume. He suggests the actor intentionally made decryption impossible as a means of disrupting operations and harming users wherever it hit.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the
conference schedule
 and
to register.
Farral says its interesting that the actors put significant engineering effort into making the malware spread throughout the victim business but did not put a lot of effort into being able to collect ransom. Even WannaCry had multiple Bitcoin wallets, he notes.
A piece of ransomware like that should be focused on gathering money for its operators, says Bitdefender senior security analyst Bogdan Botezatu. Here, he says, this was not the case.
This was not a technique used for moneymaking, he says. This is a technique used for destroying data and disrupting businesses.
Critical infrastructure was a target
Kaspersky
analysis
indicates more than 50% of businesses targeted by this malware are industrial companies. Threats like this are especially dangerous for critical infrastructure because they can potentially affect the victims automation and control systems.
Botezatu also says the first entities to get infected were critical infrastructure networks like airports, gas and utility companies, public transportation, and banks. We realized there were more businesses affected than regular consumers, he explains.
It could be a hacktivist ... or a nation-state
This doesnt have the same signs as state-sponsored malware, at least from the bigger countries weve seen in cybercrime,  says Kujawa, noting that nation-state threats are typically more secretive.
This could lend credibility to the idea that this was conducted by a hacktivist or black hat organization trying to bring awareness to the insecurities of the modern Internet. Its a loud attack, one that makes it seem like someone is trying to garner attention.
However, Farral says, this lack of complexity could also indicate a nation-state trying to cover its tracks.
This hit Ukraine very broadly, he notes. If you want to disguise youre a nation-state and did that, you could make it look like another WannaCry-type ransomware thats designed to spread using the same mechanisms. In that way theres plausible deniability -- this isnt a nation-state, its just a hacker trying to make money.
Ido Wulkan, intelligence team lead at IntSights, says this threat actor has done damage before.
What we know for sure is this threat actor has been around for at least two months and has been involved in previous campaigns, he says, recalling similarities between this incident and a campaign for infecting IoT botnets for DDoS attacks two months ago.
While Wulkan suggests this threat is more sophisticated, state-sponsored threats are typically more advanced. However, if the goal was sabotage, there is no need for using undiscovered malware. Even some state actors are reusing tools or using common tools to cover their tracks.
Related Content:
Kaspersky Lab Faces More U.S. Scrutiny Over Potential Russian Govt. Influence
Why Enterprise Security Needs a New Focus
9 Ways to Protect Your Cloud Environment from Ransomware
How To (And Not To) Make the Online Trust Honor Roll

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye