LockerGoga Ransomware
LockerGoga is a newly observed ransomware tool targeting businesses throughout Western Europe
Summary
LockerGoga is a newly observed ransomware tool targeting businesses throughout Western Europe
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication, it is unclear how LockerGoga is delivered, although there are unconfirmed reports indicating it is distributed through targeted spam campaigns
Once installed, LockerGoga will attempt to encrypt all files matching a hard-coded extension list, including DOCX, PDF and XLSX. New processes are created for each target file, causing the encryption to be very slow. LockerGoga may also attempt to remove Volume Shadow Copies, although this functionality appears to be poorly coded and may only partially delete them.
Update
A new variant of LockerGoga has been observed targeting engineering and manufacturing organisations. This variant uses a new encryption implementation (believed to be based on the CryptoPP library). As with earlier versions of LockerGoga, this variant uses multiple processes to encrypt files; however, it now utilises all CPU cores to do this, resulting in a very fast encryption process.
Whilst the encryption process occurs, this variant will log the user out before changing the login details for all administrator and user accounts on the device.
Update
Some additional details have emerged on how LockerGoga operates.
Although it is still unclear how LockerGoga is initially delivered, it is known to spread in a local network through a file copy mechanism that appears to be executed manually by a remote attacker . A set of batch files are copied to a device's TEMP folder alongside the malware itself and the PsExec tool. PsExec is used to run the batch files, which run LockerGoga on the new device and attempt to disable security utilities.
The latest observed LockerGoga binary, 1.5.1.0, works in a master/slave configuration and is initially executed with the -m switch, which runs the master process. The master process creates the list of files to encrypt and then spawns slave processes using the switches -i SM-tgytutrc -s. The slave processes encrypt the files.
When encryption has completed, LockerGoga changes the user's and Administrator account's passwords to HuHuHUHoHo283283@dJD and then logs out the user.
Remediation steps
| Type | Step |
|---|---|
|
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 14 February 2020 2:51 pm