Published Oct 24, 2017|Updated Jan 10, 2018

Ransom:Win32/Tibbar.A

Severe |Detected with Windows Defender Antivirus

Aliases: Win32/Diskcoder.D (ESET) Ransom.BadRabbit (Symantec) Ransom_BADRABBIT.A (Trend Micro)

Summary

Windows Defender Antivirus detects and removes this threat with protection update 1.255.29.0 and higher.

This ransomware attempts to reboot your PC so it can encrypt your files. You might be able to stop your PC from rebooting and instead shut it down or run a Windows Defender Offline scan:

  • Check event logs for the following IDs: 1102 and 106
    • Event 1102 indicates that the audit log has been cleared, so previous activities can’t be seen.
    • Event 106  indicates that scheduled tasks "drogon" and "Rhaegel" have been registered (these are ransomware wipers)
  • If events 1102 and 106 are present, issue a shutdown -a to prevent a reboot

You can also immediately initiate a Windows Defender Offline scan by using PowerShell or the Windows Defender Security Center app.

This ransomware can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.

This threat is also known as Bad Rabbit. It appears as a fake Adobe Flash Player update.

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. Trends show that Windows 7 devices are more likely to encounter ransomware compared to Windows 10 devices.

Read our latest report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.

 

Latest news
VIEW ALL