Hello Kitty Ransomware

Hello Kitty Ransomware

Introduction: Hello Kitty ransomware, originating from Ukraine and first identified in late 2020, is known for its nimble nature and the ability to swiftly adopt new Tactics, Techniques, and Procedures (TTPs). The ransomware garnered attention with an attack against CD Projekt Red and is named after the “HelloKittyMutex” created upon execution. Variants of Hello Kitty have utilized a Golang-based packer for improved detection evasion. Notably, a Linux variation of Hello Kitty was observed in early 2021.

Targets: Hello Kitty ransomware targets a range of entities, including small-to-medium businesses (SMBs), technology, manufacturing, and financial services organizations.

Propagation: Hello Kitty is deployed through multiple methods, including Cobalt Strike or similar frameworks and email phishing. It has also been identified as a later-stage payload in previously-infected environments, such as Qakbot and IcedID.

Technical Details:

  • Process Termination: Hello Kitty attempts to disable and terminate various processes and services to reduce interference with the encryption process. Processes related to IIS, MSSQL, Quickbooks, Sharepoint, etc., are targeted using taskkill.exe and net.exe.
  • Windows Restart Manager API: If specific processes or services cannot be stopped, Hello Kitty engages the Windows Restart Manager API for further termination assistance.
  • WMI Usage: WMI is utilized to gather system details, identify running processes, and pinpoint potentially problematic processes based on name and Process ID (PID).
  • Encryption: Hello Kitty employs a quick encryption process using various recipes, typically involving AES-256 and RSA-2048 or NTRU+AES-128. Customized ransom notes direct victims to visit a TOR-based payment and support portal.

Detection Strategies: EDR is effective in identifying and preventing malicious activities related to Hello Kitty ransomware. For those without this platform, a multi-layered approach is recommended:

  1. Security Tools:
    • Utilize anti-malware software or security tools capable of detecting and blocking known ransomware variants using signatures, heuristics, or machine learning algorithms.
  2. Network Traffic Monitoring:
    • Regularly monitor network traffic to identify indicators of compromise, such as unusual patterns or communication with known command-and-control servers.
  3. Security Audits:
    • Conduct periodic security audits and assessments to identify vulnerabilities in the network and ensure that all security controls are effective.
  4. Education & Training:
    • Educate and train employees on cybersecurity best practices, emphasizing the identification and reporting of suspicious emails and other threats.
  5. Backup & Recovery Planning:
    • Implement a robust backup and recovery plan to restore data in case of an attack.

Mitigation Measures: For EDR customers, the EDR can return systems to their original state using either the Repair or Rollback feature. For those without EDR , the following steps can help mitigate the risk of Hello Kitty ransomware attacks:

  1. Employee Education:
    • Train employees on ransomware risks, phishing email identification, and the avoidance of malicious attachments.
  2. Strong Passwords:
    • Implement strong, unique passwords for user accounts, regularly updating and rotating them.
  3. Multi-Factor Authentication (MFA):
    • Enable MFA for user accounts to add an extra layer of security.
  4. System Updates and Patching:
    • Regularly update and patch systems to fix vulnerabilities and prevent exploitation.
  5. Backup and Disaster Recovery (BDR):
    • Establish regular BDR processes, testing backups stored offsite for quick recovery.

A comprehensive approach, combining preventive measures, employee education, and recovery strategies, is crucial for effectively mitigating the risk of Hello Kitty ransomware attacks.

Back

Copyright © 2024 RASOC all rights reserved