ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

Focused in Russia and Ukraine but also spotted in Bulgaria, Germany, and Turkey, Bad Rabbit shut down Russia’s Interfax Agency--a major news outlet--as well as Ukraine’s Kiev Metro, the Odessa International Airport, and both the Ministry of Infrastructure and the Ministry of Finance. The attack on Kiev Metro was found to leverage Diskcoder.D, yet another variant of the infamous Petya ransomware.

Fortunately, there is a considerably lesser chance of Bad Rabbit repeating what WannaCry managed to accomplish during its spread across Europe and, to a lesser extent, North America. This is because, instead of relying on a worm as WannaCry did, Bad Rabbit uses a server message block vulnerability called EternalRomance to spread, after being downloaded while disguised as an Adobe Flash installer on legitimate websites. It would also appear that Bad Rabbit and NotPetya (another significant ransomware attack) were deployed by the same threat actor, as 67 percent of their codebases are the same.

There is also evidence that this threat actor is a Game of Thrones fan, as the code strings used in Bad Rabbit include character names from the novels and television series.

Unfortunately, Bad Rabbit should not have been able to spread as far as it has, as Microsoft released a patch for EternalRomance in March, when the EternalBlue vulnerability was also patched. This makes this attack yet another example of why it is crucial to install patches and updates when they are released--if the organizations affected by Bad Rabbit had done so, they would not be in the position they are now.

ClearView IT can help you make sure that your systems are not left vulnerable to attacks like this by managing your patches and updates for you. Reach out by calling 866-326-7214 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity Users VoIP Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 Browser Managed Service Apps IT Support Windows 10 Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Networking Workplace Strategy Windows Gadgets Artificial Intelligence Managed IT services Information Mobile Device Management Remote App Virtualization Business Technology Spam Server Blockchain Bandwidth Encryption WiFi Gmail Employee/Employer Relationship Office Two-factor Authentication Apple Office 365 Information Technology History Budget BDR Big Data Health Access Control Data Security Cybercrime Analytics Wi-Fi Conferencing Help Desk Vendor Hacking Cost Management IT Management Training Voice over Internet Protocol Employer-Employee Relationship Hacker Document Management Save Money Patch Management Compliance Remote Computing Remote Monitoring Website Computing Applications Vendor Management Hard Drive Vulnerabilities Search... Legal Best Practice Mobile Office Money Data storage Retail Managed Services Customer Service Alert Unified Threat Management Firewall Data loss Hiring/Firing Augmented Reality Outlook Word Password Project Management IBM BYOD Data Breach Router Websites The Internet of Things Meetings Mobility Mobile Computing YouTube Windows 11 Twitter Google Maps Marketing Monitoring Scam Laptop Running Cable Law Enforcement Healthcare End of Support Printer Remote Workers VPN Storage Windows 7 Free Resource Update Sports Social SaaS DDoS How To Travel Virtual Reality User Social Engineering Cryptocurrency Paperless Office Antivirus Black Market iPhone Education Cortana Cleaning Maintenance Content Filtering Robot Chrome Avoiding Downtime Processors Start Menu Computer Care Holidays Solid State Drive Downloads Processor PowerPoint Administration Vulnerability Cooperation Chromebook Software as a Service Drones Presentation Video Conferencing Specifications Data Protection IT Consultant Virtual Machines Automobile Computer Repair Multi-factor Authentication Wireless Technology eWaste Customer Relationship Management Professional Services How To Co-Managed IT Microchip Entertainment Flexibility Downtime Saving Time Safety Managed Services Provider Tech Terms Identity Theft Computers Bitcoin Hack Virtual Desktop Notifications Managed IT Virtual Private Network Unified Communications Telephone Experience Digital Current Events Google Docs Taxes Bluetooth Distributed Denial of Service HIPAA Excel Solutions Office Tips Memory Private Cloud Disaster Integration Images 101 Display Physical Security Virtual Assistant Lithium-ion battery Politics Settings Employees Machine Learning Banking Touchscreen Google Wallet Videos Business Intelligence Database Surveillance Computer Malfunction Inbound Marketing Managing Costs Messenger Emergency Deep Learning Vendor Mangement Health IT Equifax SSID Securty Hard Drive Disposal Employer/Employee Relationships Business Metrics Domains Hosted Solution Samsung Media Tactics Development Webcam Username Virtual Machine Books Uninterrupted Power Supply Language Business Mangement Society Electronic Payment Reviews Startup Optimization Freedom of Information Smart Technology email scam Teamwork Tablets Navigation 2FA Addiction Visible Light Communication Data Storage Mobile Security Hypervisor Reading Monitors Public Speaking Windows 8 Supercomputer User Tip Shopping Phone System Legislation News Medical IT Google Calendar SQL Server Streaming Media Virus Evernote Paperless Network Management Keyboard Advertising Motion Sickness PCI DSS Licensing Relocation Displays Work/Life Balance Google Drive Hard Drives Tech Support Proxy Server Gig Economy Emails Humor Fake News Supply Chain Comparison Computing Infrastructure Azure Business Communications intranet Service Level Agreement Internet Service Provider Shortcut Management Regulations Compliance Computer Accessories Device security Managed IT Service Knowledge Wireless Corporate Profile Telephony Heating/Cooling Employer Employee Relationship Environment Wireless Headphones Memes Microsoft Excel Workplace In Internet of Things Television Business Cards Windows XP Hacks Network Congestion Cabling Tech Human Resources Social Networking Going Green Net Neutrality G Suite Error Financial Data Reliable Computing Writing Tablet VoIP Tracking Bookmark Risk Management IT Scams Mouse Piracy Term Google Apps Download Web Server Telework HTML Scalability Text Messaging Proactive IT Digital Payment Browsers Smartwatch Nanotechnology Communitications Microsoft 365 Cables Administrator SharePoint Software License Bring Your Own Device Worker Google Play Troubleshooting Upload Procurement Social Network FinTech Staffing Access Time Management IP Address Music Public Cloud Data Analysis CES Screen Reader IT Assessment Point of Sale Trends Supply Chain Management Mobile Technology Value Security Cameras Spyware Customer Resource management Organization Devices Cyber security Shortcuts Audit Tip of the week Botnet File Sharing Fileless Malware Smart Devices Business Owner Gamification Remote Working Company Culture Rental Service Redundancy Micrsooft Flash Cache Competition Telephone System AI Regulations Trend Micro Be Proactive Recovery Transportation Telephone Systems Unified Threat Management Business Growth Workers Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Content Desktop Wasting Time LiFi Entrepreneur Application CCTV Electronic Medical Records Accountants eCommerce Modem Workplace Strategies Printing Documents

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?