A new report from McAfee Advanced Threat Research spotlights the Babuk ransomware gang, which recently announced it would be developing a cross-platform binary aimed at Linux/UNIX and ESXi or VMware systems.
McAfee’s Thibault Seret and Northwave’s Noël Keijzer wrote that many core backend systems in companies are running on these *nix operating systems, and Babuk wasted little time in infecting high-profile victims despite numerous problems with the binary. Researchers noted that some ransomware gangs experimented with writing their binaries in the cross-platform language Golang (Go).
“It seems that Babuk has adopted live beta testing on its victims when it comes to its Golang binary and decryptor development. We have seen several victims’ machines encrypted beyond repair due to either a faulty binary or a faulty decryptor,” Seret and Keijzer said.
“Even if a victim gave in to the demands and was forced to pay the ransom, they still could not get their files back. We strongly hope that the bad coding also affects Babuk’s relationship with its affiliates. The affiliates perform the actual compromise and are now faced with a victim who cannot get their data back even if they pay. This essentially changes the crime dynamic from extortion to destruction, which is much less profitable from a criminal’s point of view.”
The typical Babuk attack features three distinct phases: initial access, network propagation, and action on objectives.
Babuk also operated a ransomware-as-a-service model before shutting down in April. Northwave investigated a Babuk attack that was perpetrated through the CVE-2021-27065 vulnerability also being exploited by the HAFNIUM threat actor.
According to the report, once access is gained, the threat actor placed a Cobalt Strike backdoor on the system. Attackers generally use cobalt Strike for repeat access, and Northwave found multiple backdoors on “several key systems within the network.”
Through a custom version of zer0dump, the attacker was able to gain domain administrator credentials and used Mimikatz to get access to credentials.
“During later stages of the attack, the threat actor opted to create a new local administrator account on some of the systems as a means of additional persistence. Lateral movement between Windows systems was achieved using RDP,” the report said.
“For connections to Linux systems, the attacker made use of SSH (using Putty). Moving files to Linux systems was done using WinSCP from Windows systems. While tools used on Windows systems were downloaded from the internet. The threat actor made use of the “temp.sh” and “wdfiles.ru” file hosting websites to host most of his tools. Other tools were downloaded directly from GitHub or the websites of their respective developers.”
The attacker also used DFind, NetScan, and LAN Search Pro to search through the environment and exfiltrate data before rolling out the ransomware.
Once compressed data was exfiltrated to both Mega and Google Drive, the attacker destroyed the victim’s backups and moved on to the victim’s ESXi hosts to deploy a precompiled ransomware binary.
That binary encrypts all of a victim’s virtual machines. Still, according to McAfee’s analysis, it was “very poorly implemented and contained several different design flaws that resulted in the irreversible corruption of data.”
At the end of April, Babuk’s operators decided to change things up following the widely covered ransomware attack on the DC Police Department.
After trying and failing to extort the police department, the group leaders said they would no longer encrypt systems and instead focus on data exfiltration. They also pledged to make their ransomware an open-source project by publishing the code.
“The threat actor indicated that it would focus on publishing data from victims that were unresponsive to its ransom demands. Furthermore, the threat actor indicated that it would host and publish data for other groups. As such, the Babuk threat actor seems to be moving towards a data management position,” the report said.
“Given the poor design of its ransomware, a fair number of victims should be saved from completely losing their data when being attacked by Babuk. As mentioned in the previous sections, Northwave has seen threat actors slowly move from a scheme extorting victims by encrypting their data towards a double-extortion scheme where the threat actors both encrypt the victim’s data and exfiltrate it as well. It is interesting to see threat actors now moving towards a scheme where their sole source of pressure to extort victims is the exfiltration of sensitive data.”
The Babuk team began leaking data, first releasing source code for the Cyberpunk 2077 game in May. But after that, the gang went dark again, according to the report.
The study also discusses the Babuk decryptor, which Seret and Keijzer said has a limit in the maximum number of bytes that will decrypt, “which is strange.”
“Overall, the decryptor is poor as it only checks for the extension ‘.babyk’, which will miss any files the victim may have renamed in an attempt to recover them. Also, the decryptor checks if the file is more than 32 bytes in length as the last 32 bytes are combined later with other hardcoded values to get the final key,” the study said.
“This is bad design as those 32 bytes could be trash, instead of the key, as the customer could make things, etc. It does not operate efficiently by checking the paths that are checked in the malware. Instead, it analyzes everything.”
Seret and Keijzer go on to explain that the Babuk ransomware caused significant damage because it was operating faulty ransomware that led to a decryption process that fails in some instances, causing “irrecoverable damage.”
“We suspect that this poor design of the ransomware was the reason that the threat actor decided to move towards a data management position,” Seret and Keijzer added.
“Ultimately, the difficulties faced by the Babuk developers in creating ESXi ransomware may have led to a change in business model, from encryption to data theft and extortion.”
McAfee Advanced Threat Research warned that Babuk was posting recruitment memos asking for individuals with pentest skills. They urge defenders to watch for penetration testing tools like winPEAS, Bloodhound, and SharpHound, or hacking frameworks such as CobaltStrike, Metasploit, Empire, or Covenant.