JNEC.a Ransomware
JNEC.a is a newly observed ransomware tool exploiting a recently disclosed arbitrary code execution in the WinRAR archiving tool.
Summary
JNEC.a is a newly observed ransomware tool exploiting a recently disclosed arbitrary code execution in the WinRAR archiving tool.
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication it is unclear how archive files containing JNEC.a are delivered, although there are unconfirmed reports indicating they may be distributed via spam campaigns. When opened, WinRAR will attempt to extract a corrupted image before triggering an error message. Whilst this is happening, an open-source exploit script will load JNEC.a into the Windows Startup folder, where it will deploy when the user next logs in.
Once installed, JNEC.a will encrypt all non-system files using an unknown algorithm before displaying a ransom note within a system dialogue window. File encrypted by JNEC.a are unable to be recovered, even by it's developers, due to an error in the encryption module.
For further information:
Remediation steps
| Type | Step |
|---|---|
|
RARLab addressed CVE-2018-20250 in WinRAR version 5.70. Users and administrators are encouraged to apply this update immediately. If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
CVE Vulnerabilities
Last edited: 14 February 2020 2:53 pm