An extra way to create leverage against victims of ransomware has been introduced by the developers of the Maze ransomware. If the victim is not convi
An extra way to create leverage against victims of ransomware has been introduced by the developers of the Maze ransomware. If the victim is not convinced that she should pay the criminals because her files are encrypted, there could be an extra method of extortion. Over time, more organizations have found ways to keep safe copies of their important files or use some kind of rollback technology to restore their systems to the state they were in before the attack.
To have some leverage over these organizations, the ransomware attackers steal data from the infiltrated system while they deploy their ransomware. They then threaten to publish the data if the victim decides not to pay. Depending on the kind of data, this can be a rather compelling reason to give in.
Maze introduces leaked data
In the last quarter of 2019, Maze’s developers introduced this new extortion method. And, as if ransomware alone wasn’t bad enough, since the introduction of this methodology, many other ransomware peddlers have started to adopt it. The most well-known ransomware families besides Maze that use data exfiltration as a side-dish for ransomware are Clop, Sodinokibi, and DoppelPaymer.
The dubious honor of being noted as the first victim went to Allied Universal, a California-based security services firm. Allied Universal saw 700MB of stolen data being dumped after they refused to meet the ransom demand set by Maze. Nowadays, most of the ransomware gangs involved in this double featured attack have dedicated websites where they threaten to publish the data stolen from victims that are reluctant to pay up.
Website where the Maze operators publish the exfiltrated data of their “clients”.
Characteristics of Maze ransomware
Maze ransomware was developed as a variant of ChaCha ransomware and was initially discovered by Malwarebytes Director of Threat Intelligence Jérôme Segura in May of 2019. Since December of 2019, the gang has been very active making many high profile victims in almost every vertical: finance, technology, telecommunications, healthcare, government, construction, hospitality, media and communications, utilities and energy, pharma and life sciences, education, insurance, wholesale, and legal.
The main forms of distribution for Maze are:
- malspam campaigns utilizing weaponized attachments, mostly Word and Excel files
- RDP brute force attacks
Initially Maze was distributed through websites using an exploit kit such as the Fallout EK and Spelevo EK, which has been seen using Flash Player vulnerabilities. Maze ransomware has also utilized exploits against Pulse VPN, as well as the Windows VBScript Engine Remote Code Execution Vulnerability to get into a network.
No matter which method was used to gain a foothold in the network, the next step for the Maze operators is to obtain elevated privileges, conduct lateral movement, and begin to deploy file encryption across all drives. However, before encrypting the data, these operators are known to exfiltrate the files they come across. These files will then be put to use as a means to gain extra leverage, threatening with public exposure.
MAZE uses two algorithms to encrypt the files, ChaCha20 and RSA. After encryption the program appends a string of random 4-7 characters at the end of each file. When the malware has finished encrypting all the targeted files it changes the desktop wallpaper to this image:
In addition, a voice message is played to the user of the affected system, alerting them of the encryption.
IOCs for Maze ransomware
Maze creates a file called DECRYPT-FILES.txt in each folder that contains encrypted files. It skips some folders among which are:
• Program Files
It also skips all the files of the following types:
This ransom note called DECRYPT-FILES.txt contains instructions for the victim:
The ransom note explaining the attack and how to contact the cyber-criminals about getting files decrypted.
They then promise that:
After the payment the data will be removed from our disks and decryptor will be given to you, so you can restore all your files.
SHA 256 hashes:
Malwarebytes protects users with a combination of different layers including one that stops the attack very early on and is completely signature-less.
Besides using Malwarebytes, we also recommend to:
- Deny access to Public IPs to important ports (RDP port 3389).
- Allow access to only IPs which are under your control.
- Along with blocking RDP port, we also suggest blocking SMB port 445. In general, it is advised to block unused ports.
- Apply the latest Microsoft update packages and keep your Operating system and antivirus fully updated.
While our advice as always is not to pay the criminals since you are keeping their business model alive by doing so, we do understand that missing crucial files can be a compelling reason to pay them anyway. And with the new twist of publishing exfiltrated data that the Maze operators introduced, there is an extra reason at hand. Throwing confidential data online has proven to be an effective extra persuasion as many organizations can’t afford to have them publicly available.
Stay safe, everyone!