sb-as logo
Story image

From Dridex to Friedex: Malware creators dabble in ransomware

31 Jan 2018

If the first thing that comes to mind on the topic of banking Trojans is Dridex, prepare to add the word ‘FriedEx’ or ‘BitPaymer’ to the list of related words.

ESET researchers have discovered that the creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.

The ransomware goes after high profile targets through a remote desktop protocol (RDP) brute force attack. It encrypts all files with an individual key and then hardcoded through a 1024-bit RSA public key.

ESET senior research fellow Nick FitzGerald explains that although there is limited detection data, attackers are looking for poorly-protected RDP hosts that are exposed to the internet.

“As such poorly-secured systems tend to be run by less-security-aware folk, there is a higher chance of gaining access to a privileged account (administrator, domain administrator),” he says.

Researchers examined one of the FriedEx samples and found similarities between its code and the Dridex code.

FriedEx also uses the same techniques to hide its behaviour, has similar PDB paths, timestamps and compiler information to what Dridex uses.

Dridex was first discovered in 2014. The banking Trojan has continued to evolve, with the latest version (Dridex 4.80) released on December 14 last year.

The Trojan apparently receives weekly updates and fixes.

Because FriedEx is a ransomware, researchers admit it does have some functions not present in Dridex, including the file encryption look and creation of ransom message files.

FitzGerald adds that the large ransom demands, which can be between 20-50 Bitcoins ($US12,000 - $500,000), there is further suggestion that the attackers are targeting those that they think are able to pay the larger ransom demands.

Attackers are also able to gain access to a computer in a network and move laterally to compromise more computers and gain higher privileges. If they grab domain-wide credentials, they can inflict Dridex across many computers on a network, he continues.

"In such an attack, once the attacker obtains sufficiently elevated privileges, they can disable security products and take other steps to hamper their detection. It is very common in such cases that the attackers disable endpoint and server protection products just before running the ransomware.”

 ESET says that the Dridex creators are not a ‘one trick pony’ that remain focused on their Trojan – as evidence reveals they are adapting to trends and creating different malware that is able to compete against the most advanced in its category.

Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Download image
Equinix study: Firms turn to NFV to support distributed networks
Decision-makers looking for a solution that virtualises a wide range of network functions should evaluate NFV, study finds.More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More