July 19, 2024
By Cybervergent Team

Phobos Ransomware

Imagine a thief who not only steals your valuables but also scrambles the combination to your safe deposit box, leaving you with no way to recover what's rightfully yours. That's the chilling reality of Phobos ransomware, a cyber menace named after the Greek god of fear itself.

First appearing in 2018, Phobos preys on small and medium-sized businesses, exploiting weaknesses in their defenses to unleash its destructive power. This newsletter dives deep into the anatomy of this threat, exploring its tactics, techniques, and the chilling impact it can have.

Evolving from the Shadows: A Legacy of Fear

Phobos isn't a lone wolf. It has a dark lineage, linked to the infamous Crysis and Dharma ransomware families. Like a chameleon, Phobos adapts and evolves, emerging when decryption tools render its predecessors useless.

A Two-Pronged Attack: How Phobos Gains Entry

Think you're safe behind a locked door? Think again. Phobos employs a devious two-pronged approach to infiltrate its victims' systems:

  1. Phishing     Campaigns: Deceptive emails with malicious attachments or links trick users     into giving away their login credentials, granting Phobos access through     the front door.
  2. Remote Desktop Protocol (RDP) Exploits: Phobos can also target systems with weak RDP configurations, leveraging brute-force attacks to guess login credentials and gain     unauthorized access.
The Silent Infiltration: How Phobos Takes Control

Once inside, Phobos doesn't waste time with theatrics. It bypasses security measures and embeds itself deep within the system, ensuring its persistence even after a reboot. It then embarks on a relentless search, meticulously encrypting all your valuable data – documents, photos, and anything else it deems critical.

Part of its Techniques and Procedures

Once inside a network, Phobos actors escalate their privileges by executing additional payloads using tools like 1saas.exe or cmd.exe. This grants them extensive control over the system, enabling them to bypass access controls, steal user credentials, and ultimately achieve domain administrator access through persistent authentication attempts.

To deliver and deploy additional malware, Phobos employs a standardized three-phase process that relies on Smoke loader. This sophisticated tool manipulates API functions to bypass network defenses and obfuscate its activities. By decrypting payloads and executing them from memory, Smoke loader facilitates covert deployment of malicious components.

Double Layered Encryption and Data Exfiltration

Phobos ransomware employs a robust two-layer encryption method. First, it utilizes the Advanced Encryption Standard (AES-256) to scramble your databeyond recognition. This powerful algorithm makes the encrypted files virtually impossible to access without the decryption key. Then, to further tighten itsgrip, Phobos encrypts the decryption key itself with another layer of RSA-1024encryption. This double encryption makes it extremely difficult, if notimpossible, to recover files without the attacker's private key.

Beyond crippling encryption, Phobos actors also engage in exfiltration, a malicious practice where they steal sensitive data from your system. Theyutilize tools like WinSCP and cloud storage services like Mega.io to exfiltrate legal, financial, and technical documents. This stolen information can be usedfor further extortion attempts or even sold on the dark web, adding another Layer of damage to the victim.

How to Identify a Phobos Infection

After the encryption rampage, Phobos leaves its chilling mark. Your once-accessible files will be renamed with a unique extension containing an IDnumber, the attacker's email address, and a seemingly random word. This Ransom note serves as a grim reminder of the data held hostage and the extortiondemands to follow.

For example, a file originally named Photo.jpg might be renamed to something like;

            PHOTO.JPG.ID[12345A5B-0000].[HACKER@HACKING.COM].ELBOW

 

No Easy Escape: The Current State of Decryption

As of July 2024, there's no known publicly available decryptor for Phobos. This highlights the importance of a robust defense strategy. Regularlybacking up your data and employing robust cybersecurity software are your best lines of defense against this growing threat.

Beyond Encryption: The Full Arsenal of Phobos

Phobos isn't just about locking away your data. It also engages in a series of malicious activities to maximize its impact:

  • Exfiltration: It can steal     sensitive documents like legal and financial records, adding insult to     injury.
  • Backup     Obliteration: It hunts down and deletes backups, further diminishing your chances     of recovery.
  • Disabling     Security Measures: Like a cunning predator, it     disarms your firewalls and security software, leaving you even more     vulnerabl.
Surviving the Ransomware:

The Phobos threat is a stark reminder that cybersecurity vigilance is paramount. At Cybervergent we would always stay abreast, trying and solidifying mitigation strategies, evolving as cyberthreats evolve. For Phobos Ransomware, We recommend:

·       Secure remote access software by applying recommendations from the Guide to Securing Remote Access Software, focusing on secure design and default configurations.

·       Maintain offline backups of data, regularly updating and testing backup and restoration processes.

·       Identify abnormal activity with network monitoring tools and implement endpoint detection and response (EDR)tools for detecting lateral connections

·       Strictly limit the use of RDP and other remote desktop services, auditing network systems and enforcing account lockouts.

·       Disable unused ports and protocols, consider adding email banners, and disable hyperlinks in received emails.

·       Monitor for indicators of compromise and report any suspicious activity to the experts.