{"id":2398,"date":"2021-06-17T14:49:36","date_gmt":"2021-06-17T05:49:36","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=2398"},"modified":"2021-07-08T11:08:18","modified_gmt":"2021-07-08T02:08:18","slug":"rapid-ransomware","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/rapid-ransomware\/","title":{"rendered":"Rapid Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2398\" class=\"elementor elementor-2398\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6379c4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6379c4c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9cfb40e\" data-id=\"9cfb40e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-212a85b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"212a85b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-88cf626\" data-id=\"88cf626\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b02074 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0b02074\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">RAPID RANSOMWARE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb77243 elementor-widget elementor-widget-image\" data-id=\"bb77243\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?fit=700%2C400&amp;ssl=1\" title=\"cyber-security-3400657_1920\" alt=\"cyber-security-3400657_1920\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6cfadbf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6cfadbf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e392ea6\" data-id=\"e392ea6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cae7fc8 elementor-widget elementor-widget-text-editor\" data-id=\"cae7fc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Introduction<\/span><\/strong><\/h4><p style=\"text-align: left;\">Rapid ransomware made its first appearance in 2017 as it was being distributed through phishing campaigns of Fake Internal Revenue Service (IRS) emails with a malicious zip attachment. <br \/>Attacks involving the active variants of Rapid ransomware have been frequent and have been recorded to target organisations of small to medium size from many countries including USA and Europe. <br \/>There is no decryptor for any of the active variants of the Rapid ransomware and the average ransom required is $9250 which can be paid via emails or Tor chat link addresses provided in the ransomware note. <\/p><h3 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Modus Operandi<\/span><\/strong><\/h3><h5 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Initial access<\/span><\/strong><\/h5><p>The threat actor would send a phishing email with a malicious zip file attachment that would contain the Rapid ransomware payload. Although there have been some reports of threat actors embedding the malware within fake website downloads and inside BitTorrent websites.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c5fad3d\" data-id=\"c5fad3d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c7252c elementor-widget elementor-widget-text-editor\" data-id=\"6c7252c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5><strong>Installation<\/strong><\/h5><p>When the targets open the malicious zip fie attachment, it causes a PowerShell process to be spawned and cause Rapid attempts to copy itself to any available admin shares. After the threat actor has gained remote access to the network, the payload downloaded to a compromised machine and then installs itself into &#8220;%APPDATA%\/Roaming\/&#8221; under the name of \u201cinfo.exe\u201d and configures itself into the system registry as an auto-run item so it will run whenever the compromised machine starts and therefore has the ability to check for newly created files and encrypt them. The threat actor also uses the windows utility &#8220;bcdedit.exe&#8221; to disable windows automatic repair mode. <br \/>Rapid will attempt to kill processes and stop services related to antivirus, database, backup, and document editing software from a list of predefined service and process names by executing \u201ctaskkill\u201d and \u201cnet stop\u201d. And then Rapid attempts to scan the network for shadow copies and then deletes any shadow copies that were found to ensure that the victims will not be able to recover their encrypted files. <\/p><h5><strong>Encryption<\/strong><\/h5><p>In preparation for encryption, Rapid attempts to terminates any files related to databases like SQL and Oracle to allow for Rapid to gain access to the database files. Then Rapid starts to encrypt all found files on fixed, removable, and network drives. Rapid ransomware generates a unique AES 256-bit key for every file and then encrypts the AES key with the hardcoded RSA public key. Then Rapid encrypts files with the AES file key and overwrites the original content with the encrypted content. Finally Rapid adds the extension \u2018.rapid\u2019 to every filename of each file encrypted.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>RAPID RANSOMWARE Introduction Rapid ransomware made its first appearance in 2017 as it was being distributed through phishing campaigns of Fake Internal Revenue Service (IRS) emails with a malicious zip attachment. Attacks involving the active variants of Rapid ransomware have been frequent and have been recorded to target organisations of small to medium size from many countries including USA and<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":2414,"parent":3201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2398","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2398"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=2398"}],"version-history":[{"count":16,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2398\/revisions"}],"predecessor-version":[{"id":4330,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2398\/revisions\/4330"}],"up":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/2414"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=2398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}