1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

New Satana ransomware encrypts user files and master boot record

Discussion in 'General Malware And Security' started by starbuck, Jul 2, 2016.

  1. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    It's the second ransomware threat after Petya that leaves computers unable to boot into the OS

    9c41fb591537041b6e659f96342c7d4d.jpg

    Attackers are developing an aggressive new ransomware program for Windows machines that encrypts user files as well as the computer's master boot record (MBR), leaving devices unable to load the OS.

    The program is dubbed Satana -- meaning "Satan" in Italian and Romanian -- and, according to researchers from security firm Malwarebytes, it is functional but still under development.

    Satana is the second ransomware threat affecting the MBR and seems inspired by another program, Petya, that appeared in March.

    The MBR code is stored in the first sectors of a hard disk drive, contains information about the disk's partitions and launches the operating system's boot loader.
    Without a proper MBR, computers don't know which partitions contain the OS and how to start it.

    There are significant differences between Satana and Petya.
    For example, Petya replaces the MBR in order to launch a custom bootloader that then encrypts the system's master file table (MFT) -- a special file on NTFS partitions that contains information about all other files, like names, sizes and mappings to the hard disk sectors.

    Satana doesn't encrypt the MFT.
    It just replaces the MBR with its own code and stores an encrypted version of the original boot record so it can restore it later if the victim pays the ransom.
    This leaves the computer unbootable, but can be fixed more easily than if the MFT had also been encrypted.

    In May, Petya was combined with a separate ransomware program, called Mischa, which exhibits a more traditional behavior: it encrypts users' personal files directly if it can't obtain administrator privileges to attack the MBR and MFT.

    Satana uses the same combination of traditional file encryption and MBR encryption, but in the same program.
    It first encrypts user files with specific extensions and then waits patiently for the first reboot, at which time it replaces the MBR.
    The user then sees a screen demanding a ransom payment of 0.5 bitcoin (about US$340).

    This routine makes it harder for nontechnical users to restore their systems, because it forces them to use a separate computer to make the payment, as the affected computer can no longer boot into Windows.

    "Unfortunately, at this time there is no way to decrypt Satana encrypted files for free
    ," said Lawrence Abrams, founder of the BleepingComputer.com tech support forum, in a blog post.

    Users might be able to repair the MBR by using the Windows recovery options, but this requires working with the Windows command line and the bootrec.exe (boot recovery) tool, so it is likely beyond the abilities of typical users.

    The current version of Satana hasn’t yet been widely distributed, and the researchers don’t expect that it will because the code is not yet mature and has flaws. However, they believe this version will likely serve as a base for future improvements.


    Source:
    http://www.networkworld.com/article...s-and-master-boot-record.html#tk.rss_security
     
  2. gus

    gus Registered Members

    Joined:
    Mar 30, 2016
    Messages:
    129
    Location:
    Sydney, Australia
    Operating System:
    Windows 10
    Computer Brand or Motherboard:
    Gigabyte z97x-ud5h-bk
    CPU:
    certified practicly useless
    Memory:
    that's gone too
    Hard Drive:
    not any more, too old
    Graphics Card:
    none of that stuff, just black and white pics.
    Power Supply:
    Steam power
    A free tool the "typical" user could try is the MiniTool Partition wizard bootable CD available HERE it can and does rebuild the MBR. It is quite easy to use and know of a user who screwed his dual boot grub menu up and couldn't boot, this tool fixed it in a couple of minutes. I don't pretend to say it will be a foolproof fix, but sure is an easy attempt. It still remains a poor second choice to having a remote backup.

    2016-07-03_154733.jpg
     
  3. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    Thanks for the addition gus.
     

Share This Page