Ramnit Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The original Ramnit variant propagated via vulnerable FTP servers or removable drives, with later versions delivered through spam or phishing campaigns, drive-by-downloads, watering hole attacks or by popular exploit kits such as Angler. Fake Android applications are also used to deliver Ramnit; the disguised files are dormant on the Android device itself but will propagate to any Windows device that is connected to it.
Once on a device, Ramnit will write itself to all available EXE, DLL, HTM and HTML files to maintain persistence and improve propagation. This makes it very difficult to remove Ramnit without completely wiping the infected device. It will then inject itself into all running processes to remain memory-resident before removing any security-related registry keys. Variants from 2014 onward are able to infect the Master Boot Record.
Ramnit's primary focus is the theft of financial or banking credentials and information, however it can also download additional malware, simulate user inputs, inject malicious code into visited websites, receive remote commands and collect user or system information. Some versions will use the Windows CreateDesktop feature to create a hidden desktop that the attacker can use to execute applications without the users knowledge.
Threat updates
| Date | Update |
|---|---|
| 7 Aug 2018 |
A new malware campaign called “Black” has been seen infecting users with an updated version of Ramnit. There are several features of this botnet:
|
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 11:37 am