Warning message... Link to action
Office 365 client apps now integrate with AMSI, enabling security solutions to scan macros at runtime. Learn how this integration exposes malicious intent
Aliases: Win32/Diskcoder.D (ESET) Ransom.BadRabbit (Symantec) Ransom_BADRABBIT.A (Trend Micro)
Windows Defender Antivirus detects and removes this threat with protection update 126.96.36.199 and higher.
This ransomware attempts to reboot your PC so it can encrypt your files. You might be able to stop your PC from rebooting and instead shut it down or run a Windows Defender Offline scan:
- Check event logs for the following IDs: 1102 and 106
- Event 1102 indicates that the audit log has been cleared, so previous activities can’t be seen.
- Event 106 indicates that scheduled tasks "drogon" and "Rhaegel" have been registered (these are ransomware wipers)
- If events 1102 and 106 are present, issue a shutdown -a to prevent a reboot
This ransomware can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.
This threat is also known as Bad Rabbit. It appears as a fake Adobe Flash Player update.
The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. Trends show that Windows 7 devices are more likely to encounter ransomware compared to Windows 10 devices.