CONTENT & PR OFFICER @HEIMDAL™ SECURITY

The imagination of cyber criminals seems to be unlimited when it comes to developing new methods to obtain what they want from their victims. We often hear about new ransomware strains that make victims every other week all across the globe – and they are all getting more and more dangerous. One such ransomware strain is Avaddon ransomware. Let’s find out more about how it works and what you can do to prevent an infection!

Avaddon Ransomware: Definition of Main Concepts

In general, ransomware can be defined as

a type of malware (malicious software) which encrypts all the data on a PC or mobile device, blocking the data owner’s access to it. After the infection happens, the victim receives a message that tells him/her that a certain amount of money must be paid (usually in Bitcoins) in order to get the decryption key. Usually, there is also a time limit for the ransom to be paid. There is no guarantee that, if the victim pays the ransom, he/she will get the decryption key. 

Ransomware-as-a-Service represents

a new business model for ransomware developers. Like software as a service (SaaS), the ransomware developers sell or lease their ransomware variants to affiliates who then use them to perform an attack. The RaaS business model makes ransomware usable by non-computer-savvy persons.  

Avaddon Ransomware: How Avaddon Works

In the cybersecurity landscape, we’ve first learned about the Avaddon ransomware in February 2020;  it has been offered with a Ransomware-as-a-Service model since June 2020. 

Similar to how Maze ransomware proceeded, the Avaddon ransomware operators also have a data leak site where they expose the data of those who do not pay the ransom. Another significant aspect of Avaddon ransomware is that, apart from exposing the encrypted data, its operators also threaten to carry out DDoS attacks.  

After a free decryptor was developed in February this year and made publicly available, the ransomware’s creators also updated their code to make sure they still succeed with their criminal activities. 

avaddon ransomware 1

Source

Here’s how Avaddon ransomware works

Avaddon is spread via phishing and malicious spam campaigns that deliver malicious JavaScript files, the ACSC says.

“These are often low in sophistication, containing a threat suggesting the attached file contains a compromising photo of the victim,” the Australian agency says. “‘Double extortion’ techniques are used, such as coercion and further pressure to pay a ransom, including threatening to publish the victim’s data … and threatening the use of DDoS attacks against the victims.”

Written in C++, Avaddon encrypts data using a unique AES256 encryption key, the agency reports. During the infection process, Avaddon checks the operating system language and keyboard layouts. If a potential victim’s operating system language is set to specific languages normally used in the Commonwealth of Independent States – formerly part of the Soviet Union – the malware ceases operation without harming the system.

In addition, the operators behind Avaddon apply the GetUserDefaultLCID() function to identify the default geolocation and system language of the user’s device to determine whether the user will be targeted for attack. This technique has also been observed in ransomware campaigns using the MedusaLocker variant, ACSC states.

BankInfoSecurity also adds:

“After Avaddon actors gain access to a victim’s network, they map the network and identify backups for deletion and/or encryption,” the FBI says. “The malware escalates privileges, contains anti-analysis protection code, enables persistence on a victim system and verifies the victim is not located in the Commonwealth of Independent States.”

The Avaddon attackers use data leak site avaddongun7rngel[.]onion to identify victims who do not pay ransoms, ACSC says. They demand ransom payment via bitcoin, with an average demand of about $40,000 in exchange for a decryption tool, the Australian agency says.

avaddon ransomware 2

Source

Avaddon Ransomware: Famous Targets

One of the victims of the Avaddon Ransomware is the French insurance company AXA. The incident took place last month and it affected the company’s Asia Assistance division and the IT operations in Thailand, Malaysia, Hong Kong, and the Philippines. 

The data that Avaddon operators claimed to have stolen includes customer IDs, customer claims, contracts and reports, and more. 

avaddon ransomware 3

Source

The ransomware attack may be viewed as retribution for AXA’s decision to “stop writing cyber-insurance policies in France that reimburse customers for extortion payments made to ransomware criminals.”

Another recent victim of the Avaddon ransomware operators is a Melbourne-based service provider called Communication –  a platinum partner of the telecom giant Telstra. The company’s website went offline for several days. 

Avaddon Ransomware: What to Do If You’re Infected 

When an Avaddon ransomware infection occurs, the first thing you need to do is contain and neutralize:

  • Identify what devices have been infected and isolate them immediately by unplugging the network cable or turning off the Wi-Fi adapter. Unless you can’t disconnect the network, don’t shut down the affected devices
  • Try to assess the damage: what has been affected? What has been lost? Are your backups safe? If so, you should make an offline copy as soon as possible.
  • Return to your incident response plan, which is a “documented, written plan with 6 distinct phases that help IT professionals and staff recognize and deal with a cybersecurity incident like a data breach or cyber attack.”  The six phases of an incident response plan include preparation, identification, containment, eradication, recovery, lessons learned. 

After these steps, you should focus on investigation:

  • You may discover that the attackers got access to your network days or even weeks before the attack. 
  • Avaddon ransomware operators may target both Windows and Linux systems and they might succeed by securing access to domain admin accounts or other privileged accounts
  • Check for any backdoors that the attackers might have installed that allowed them to get into your network undetected. You need to find them in order to avoid becoming a victim again.
  • Your security solutions might have been disabled. 

Avaddon Ransomware: To Pay or Not to Pay, This Is the Question

Well, according to the FBI

In some cases, victims who paid a ransom were never provided with decryption keys. In addition, due to flaws in the encryption algorithms of certain malware variants, victims may not be able to recover some or all of their data even with a valid decryption key. Paying ransoms emboldens criminals to target other organizations and provides an alluring and lucrative enterprise to other criminals. However, the FBI understands that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers. Regardless of whether you or your organization have decided to pay the ransom, the FBI urges you to report ransomware incidents to law enforcement. Doing so provides investigators with the critical information they need to track ransomware attackers, hold them accountable […], and prevent future attacks.

Avaddon Ransomware: How to Stay Safe

So, if paying the ransom should not be an option, what can you do to avoid an attack in the first place? Think about your company’s cybersecurity from a holistic point of view and apply a “defense in depth strategy”, that should absolutely include: 

If you’re interested, you can find solutions that deal with all these aspects in the Heimdal™ Security offer

Our Heimdal™ Patch & Asset Management will help you close vulnerabilities by allowing you to update software and operating systems from a unified dashboard and deploying Windows, 3rd party, and custom software to your endpoints anywhere in the world.

Heimdal Official Logo
Automate your patch management routine.

Heimdal™ Patch & Asset Management

Remotely and automatically install Windows and 3rd party application updates and manage your software inventory.
  • Schedule updates at your convenience;
  • See any software assets in inventory;
  • Global deployment and LAN P2P;
  • And much more than we can fit in here...
Find out more Offer valid only for companies.

Heimdal™Email Security’s analysis vectors will keep all malicious emails out of your inbox, automatically removing malware-laced attachments, filtering emails coming from malicious IPs or domains, or those containing malicious URLs. You’ll have no more worries about elaborate phishing attempts and malware hiding in your emails.

Ransomware Encryption Protection is a solution designed to adapt and counter both zero-day threats and altered malicious code, universally compatible with any antivirus. 

Heimdal Official Logo
Neutralize ransomware before it can hit.

Heimdal™ Ransomware Encryption Protection

Specifically engineered to counter the number one security risk to any business – ransomware.
  • Blocks any unauthorized encryption attempts;
  • Detects ransomware regardless of signature;
  • Universal compatibility with any cybersecurity solution;
  • Full audit trail with stunning graphics;
Try it for FREE today Offer valid only for companies.

Last but not least, it’s of paramount importance to make sure that you provide cybersecurity training to all your employees, so that everybody knows what they should and shouldn’t do. 

Avaddon Ransomware: Wrapping Up

Avaddon is a ransomware strain that can come with an unpleasant twist, but one that can still be prevented by adopting a good cybersecurity posture and making sure that all your employees have basic cybersecurity knowledge

However you choose to proceed, please remember that Heimdal™ Security always has your back and that our team is here to help you protect your home and your company and to create a cybersecurity culture to the benefit of anyone who wants to learn more about it. 

Drop a line below if you have any comments, questions, or suggestions related to the topic of the Avaddon ransomware – we are all ears and can’t wait to hear your opinion!

Business Closed and Decryption Keys Released: Avaddon Ransomware Group Is Gone

Enterprise Patch Management: What It Is and Why You Need It

Avaddon Ransomware Hits Insurance Giant AXA

Avaddon Ransomware Attacks on The Rise

Defense in Depth Strategy: the Key For Outstanding Cybersecurity

Privileged Account Management 101: How Can Privileged Accounts Compromise Your Security

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP