August 22, 2018 By Douglas Bonderud 2 min read

KeyPass, a new variant of the STOP ransomware, has been detected across 20 countries in the last two weeks — and researchers still aren’t sure exactly how it spreads.

According to Kaspersky Lab, the most likely infection vector is fake installers masquerading as benign software that downloads the ransomware module. Written in C++ and compiled in Microsoft Visual Studio, this Trojan first makes a copy of its executable in LocalAppData, launches it and then deletes the file.

Next, the malware spawns multiple instances of itself and begins passing both assigned victim ID numbers and encryption keys as command line arguments. Each file receives the .KEYPASS extension and up to 5 MBs of data is encrypted. All directories receive the “!!!KEYPASS_DECRYPTION_INFO!!!.txt” ransom note, which directs victims to pay $300 within 72 hours to have their files restored.

Since Aug. 8, the ransomware has spread across 20 countries, including Brazil, Mongolia and Algeria.

Key Concerns for Corporations

As the Kaspersky researchers noted in a blog post on Securelist, “The developers of this Trojan implemented a very simplistic scheme,” using the advanced encryption standard’s symmetric AES-256 algorithm in ciphertext feedback (CFB) mode with Zero IV and identical 32-byte keys for each file. In addition, if the ransomware can’t contact its command-and-control (C&C) server, it uses a hardcoded encryption key and ID, making the decryption of any files “trivial,” according to the researchers.

Despite its obvious simplicity, however, KeyPass comes with several key concerns. First is the lack of certainty about the mechanism of infection. While the leading candidate is fake installers, possibly used for software cracks or other gray market programs, some victims claimed they were infected without downloading anything. And since the ransomware infects both local drives and network shares while avoiding specific directories, such as those for Internet Explorer or Google, users may not notice the problem until the 72-hour window for “cheap” decryption has already expired.

Also worth noting is the existence of a graphical user interface (GUI) “manual control” mode, which lets attackers alter the encryption process by changing the encryption key, editing victim IDs, modifying file extensions and managing the list of excluded paths.

How to Keep KeyPass at an Arm’s Length

Christopher Scott, chief technology officer (CTO) and global remediation lead for IBM X-Force Incident Response and Intelligence Services (IRIS), advises companies to focus on security hygiene to prevent ransomware attacks such as KeyPass. With 69 percent of organizations worried that traditional antivirus solutions won’t stop threats, according to the Ponemon Institute, security teams should “embrace endpoint detection and response (EDR) technology to detect these attacks earlier to reduce overall impact,” Scott wrote.

Sources: Securelist, Ponemon Institute

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today