GlobeImposter Ransomware
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Typically delivered via spam emails distributed by the Necurs botnet, GlobeImposter has also been observed as a secondary payload in the RiG exploit kit and as a payload in Remote Desktop services attacks.
Once installed, GlobeImposter has several techniques to evade detection. It uses binary files written to the TEMP folder instead of Portable Executable files to avoid common anti-virus (AV) scans. These files are executed by the NullSoft Scriptable Install System, a legitimate software tool, making it harder for AV to detect it as malicious activity. It will also uses process hollowing to disguise itself as other applications
GlobeImposter will search for all connected drives including network shares and USB devices before encrypting all available files using a number of schemes, usually AES256. Ransom notes demand payment in a number of cryptocurrencies paid to Tor addresses
Remediation steps
| Type | Step |
|---|---|
|
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection: Identifying the affected device and disconnecting or quarantining it from the network is essential to damage limitation.
To limit the damage of ransomware and enable recovery:
The only guaranteed way to recover from a ransomware infection is to restore all affected files from their most recent backup. |
Last edited: 17 February 2020 11:31 am