Introduction
The Sangfor Security Team has recently detected and identified a new ransomware virus, dubbed the “Attention” virus by the Sangfor team, found to be quite active in the manufacturing and medical industries. The “Attention” virus employs insidious methods of social engineering and RDP brute-force attacks to spread the virus manually. Perhaps more unsettling, after the virus has encrypted the files, the attacker deletes the virus vector and intrusion logs manually.

There are currently several enterprises in Asia who have fallen victim to the “Attention” virus, and with no known decryption method, businesses are feeling the impact. Encrypted files are first appended with 10-12 randomly-chosen letters, followed by subsequent ransom note generation. While the virus is capable of self-duplication upon system startup, the attacker then manually deletes the self-duplication program.

Virus Analysis
1. The ransom informs the victim “YOUR FILES ARE ENCRYPTED.TXT,” as shown below: 

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 01

2. The encrypted files are appended with 10-12 randomly-chosen letters (the first three letters are fixed), as shown below: 

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 02

Sample Analysis
1. First, a random file named B3A9A362.ghost is generated in directory %temp% and 00 is written into the file as well, as shown below:

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 03

2. It then copies itself to C:\Users\panda\AppData\Roaming\Microsoft\Windows in system file ctfmon.exe, as shown below:

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 04

3. Using ShellExecute, it accesses the ctfmon.exe program and runs the ransomware program, as shown below: 

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 05

4. The original file is then deleted automatically, as seen below:
"/c for /l %x in (1,1,666) do ( ping -n 3 127.1 & del "C:\Users\panda\Desktop\Ransomware1.exe" & if not exist "C:\Users\panda\Desktop\Ransomware1.exe" exit )"

5. A secret ransom key is subsequently generated and saved to the registry in HKEY_CURRENT_USER\Software\Ghost\Service, as shown below: 

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 06

6. The “Attention” virus then traverses shared folders, disks and file directories across the network, as shown below: 

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 07

7. The virus then encrypts files after reading the file contents. 

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 08

The file name is then appended with 10-12 randomly-chosen letters.

Solution
There are currently no decryption tools capable of decrypting victims’ files. You are advised to isolate infected hosts and disconnect them from network. Sangfor also recommends you perform a virus scan and removal as soon as possible.

Ransomware Detection
1. Sangfor NGAF is capable of detecting this ransomware virus.

New Ransomware Virus Attacks Target Medical and Semiconductor Industries 09

2. Sangfor offers customers and users free anti-malware software to scan for and remove the “Attention” ransomware virus and others.

Protection
The Sangfor Security Team recommends taking extra precautions to protect devices from infection, as no decryption methods are yet known.

1. Fix the vulnerability quickly by installing the corresponding patch on the host.
2. Back up critical data files regularly to other hosts or storage devices.
3. Do not click on any email attachment from unknown sources and do not download any software from untrusted websites.
4. Disable unnecessary file sharing.
5. Strengthen passwords and avoid using the same password for multiple computers to avoid compromising a series of computers on the network.
6. Disable RDP if it is unnecessary for your business. If you find your network under attack, use Sangfor NGAF to block port 3389 and any other vulnerable ports to stop the virus from spreading.
7. Sangfor NGAF can prevent brute-force attacks. Activate NGAF brute-force attack prevention and enable rules 11080051, 11080027 and 11080016.
8. For Sangfor NGAF customers, update NGAF to version 8.0.5 and enable AI-powered Sangfor Engine Zero to receive the best protection.
9. Deploy any Sangfor security products and connect to cloud-based Sangfor Neural-X to detect new threats.
10. Perform a network-wide security scan and virus removal to enhance network security. We recommend Sangfor NGAF to detect, prevent and protect your internal network.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

Cyber Security

The AT&T Data Breach: Over 73 Million Customer Data Exposed

Date : 15 Apr 2024
Read Now
Cyber Security

What Are the Top 5 Benefits of SD-WAN?

Date : 29 Mar 2024
Read Now
Cyber Security

World Backup Day 2024: Save Digital Memories

Date : 29 Mar 2024
Read Now

See Other Product

Best Darktrace Cyber Security Competitors and Alternatives in 2024
Sangfor Omni-Command
Cyber Command - NDR Platform
Endpoint Secure
Internet Access Gateway (IAG)
Sangfor Network Secure - Next Generation Firewall