Story image

From Dridex to Friedex: Malware creators dabble in ransomware

31 Jan 2018

If the first thing that comes to mind on the topic of banking Trojans is Dridex, prepare to add the word ‘FriedEx’ or ‘BitPaymer’ to the list of related words.

ESET researchers have discovered that the creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.

The ransomware goes after high profile targets through a remote desktop protocol (RDP) brute force attack. It encrypts all files with an individual key and then hardcoded through a 1024-bit RSA public key.

ESET senior research fellow Nick FitzGerald explains that although there is limited detection data, attackers are looking for poorly-protected RDP hosts that are exposed to the internet.

“As such poorly-secured systems tend to be run by less-security-aware folk, there is a higher chance of gaining access to a privileged account (administrator, domain administrator),” he says.

Researchers examined one of the FriedEx samples and found similarities between its code and the Dridex code.

FriedEx also uses the same techniques to hide its behaviour, has similar PDB paths, timestamps and compiler information to what Dridex uses.

Dridex was first discovered in 2014. The banking Trojan has continued to evolve, with the latest version (Dridex 4.80) released on December 14 last year.

The Trojan apparently receives weekly updates and fixes.

Because FriedEx is a ransomware, researchers admit it does have some functions not present in Dridex, including the file encryption look and creation of ransom message files.

FitzGerald adds that the large ransom demands, which can be between 20-50 Bitcoins ($US12,000 - $500,000), there is further suggestion that the attackers are targeting those that they think are able to pay the larger ransom demands.

Attackers are also able to gain access to a computer in a network and move laterally to compromise more computers and gain higher privileges. If they grab domain-wide credentials, they can inflict Dridex across many computers on a network, he continues.

"In such an attack, once the attacker obtains sufficiently elevated privileges, they can disable security products and take other steps to hamper their detection. It is very common in such cases that the attackers disable endpoint and server protection products just before running the ransomware.”

 ESET says that the Dridex creators are not a ‘one trick pony’ that remain focused on their Trojan – as evidence reveals they are adapting to trends and creating different malware that is able to compete against the most advanced in its category.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.