{"id":2374,"date":"2021-06-16T16:58:59","date_gmt":"2021-06-16T07:58:59","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=2374"},"modified":"2021-07-05T20:48:31","modified_gmt":"2021-07-05T11:48:31","slug":"phobos-ransomware","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/phobos-ransomware\/","title":{"rendered":"Phobos Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2374\" class=\"elementor elementor-2374\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-291f7a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"291f7a6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8863e5d\" data-id=\"8863e5d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-49c4b3d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49c4b3d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ada458d\" data-id=\"ada458d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21c2b95 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"21c2b95\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;flash&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">PHOBOS RANSOMWARE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737eb20 elementor-widget elementor-widget-image\" data-id=\"737eb20\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?fit=700%2C400&amp;ssl=1\" title=\"ransomware-2320793_1920\" alt=\"ransomware-2320793_1920\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5e4cd7e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e4cd7e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f44913b\" data-id=\"f44913b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b81c7e2 elementor-widget elementor-widget-text-editor\" data-id=\"b81c7e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Introduction<\/span><\/strong><\/h4><p style=\"text-align: left;\">Phobos ransomware made its first appearance in 2018 as it was being distributed by exploits Remote Desktop Protocol (RDP) and poorly secured RDP credentials. <br \/>Attacks involving the Phobos ransomware have been frequent and have been recorded to target organisations of small to medium size from many countries. <br \/>There is no decryptor for any of the active variants of the Phobos ransomware and the average ransom required is $38,100 which can be paid via emails addresses provided in the ransomware note. <\/p><h3 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Modus Operandi<\/span><\/strong><\/h3><h5 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Initial access<\/span><\/strong><\/h5><p>The threat actor exploits Remote Desktop Protocol (RDP) services via TCP port 3389 and brute force the password to gain access to a computer. Although there have been recorded cases of Phobos being distributed as malicious attachments in phishing emails<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e150ef5\" data-id=\"e150ef5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99c2538 elementor-widget elementor-widget-text-editor\" data-id=\"99c2538\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5><strong>Installation<\/strong><\/h5><p>After the hacker has gained remote access to a compromised server, the payload downloaded to the compromised server and Phobos is unpacked by a packer program into the memory. Then Phobos add itself into the system registry as an auto-run item and installs itself into the Startup folders and in %APPDATA%. Then it is executed with administrator privileges. <br \/>Phobos will scan the network for shadow copies and then deletes any shadow copies that were found to ensure that the victims will not be able to recover their encrypted files. It also kills processes and stop services related to antivirus, database, backup, and document editing software from a list of predefined service and process names. <\/p><h5><strong>Encryption<\/strong><\/h5><p>When Phobos is executed, it starts to encrypt files on the compromised machines through AES-256 with RSA-1024 asymmetric encryption algorithm via Windows Crypto API. Due to it using preinstalled windows functions, Phobos can encrypt the files without the need of being connected to the internet as it comes with hardcoded public keys.<\/p><h5><strong>Command and Control<\/strong><\/h5><p>During the attack, Phobos sends the results from the scans from initial reconnaissance of the target\u2019s network to a C&amp;C server which is used to determine how much the initial ransom will be.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PHOBOS RANSOMWARE Introduction Phobos ransomware made its first appearance in 2018 as it was being distributed by exploits Remote Desktop Protocol (RDP) and poorly secured RDP credentials. Attacks involving the Phobos ransomware have been frequent and have been recorded to target organisations of small to medium size from many countries. There is no decryptor for any of the active variants<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":2393,"parent":3201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2374","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2374"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=2374"}],"version-history":[{"count":16,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2374\/revisions"}],"predecessor-version":[{"id":3376,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2374\/revisions\/3376"}],"up":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/2393"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=2374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}