Skip to main content

OSINT - Return of Not Petya as Bad Rabbit Diskcoder, yes those two are the same!

Low
Published: Wed Oct 25 2017 (10/25/2017, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: type
Product: osint

Description

OSINT - Return of Not Petya as Bad Rabbit Diskcoder, yes those two are the same!

AI-Powered Analysis

AILast updated: 07/02/2025, 13:57:38 UTC

Technical Analysis

The threat described involves the resurgence of ransomware variants linked to the infamous NotPetya and Bad Rabbit malware families, collectively referred to here as "Not Petya as Bad Rabbit Diskcoder." Both NotPetya and Bad Rabbit are ransomware strains that emerged around 2017 and are known for their destructive impact on infected systems. NotPetya masqueraded as ransomware but was primarily a wiper designed to cause widespread damage, while Bad Rabbit was a ransomware outbreak that spread via fake Adobe Flash installers, encrypting files and demanding ransom payments. This OSINT report highlights that these two malware strains are essentially the same or closely related, indicating a possible re-emergence or variant combining characteristics of both. The malware operates by encrypting user data and potentially disrupting workstation communications, which can severely impact business operations. The report suggests preventive measures such as maintaining robust backup and restore processes and restricting workstation communication to limit lateral movement within networks. Although the severity is marked as low in the source, the technical threat level is noted as 3, indicating a moderate concern. No known exploits in the wild are reported currently, and no specific affected versions or patches are identified, which suggests this is an intelligence observation rather than an active widespread campaign at the time of reporting.

Potential Impact

For European organizations, the impact of a ransomware outbreak similar to NotPetya or Bad Rabbit can be significant. These malware strains have historically caused extensive operational disruptions, data loss, and financial damage due to ransom demands and recovery costs. Critical infrastructure, healthcare, transportation, and financial sectors are particularly vulnerable due to their reliance on continuous availability and sensitive data. The disruption of workstation communication can lead to network segmentation issues, hampering incident response and recovery efforts. Even if the current threat level is low, the potential for rapid lateral movement and encryption of critical files could lead to downtime, reputational damage, and regulatory penalties under GDPR if personal data is compromised or lost. European organizations with legacy systems or insufficient network segmentation are at higher risk. Additionally, the geopolitical climate in Europe, with heightened cyber tensions, increases the likelihood of ransomware being used as a tool for disruption or extortion.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic advice. First, ensure comprehensive and tested backup and restore procedures are in place, with backups stored offline or in immutable formats to prevent ransomware encryption. Second, enforce strict network segmentation and restrict unnecessary workstation-to-workstation communication to limit malware propagation. Third, deploy application whitelisting and monitor for suspicious execution of installers or scripts, especially those mimicking Adobe Flash or other common software. Fourth, maintain up-to-date endpoint detection and response (EDR) solutions capable of identifying ransomware behaviors early. Fifth, conduct regular user awareness training focusing on phishing and social engineering tactics used to deliver ransomware payloads. Finally, establish incident response plans specifically addressing ransomware scenarios, including communication protocols and legal considerations under European data protection laws.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
2
Original Timestamp
1511385575

Threat ID: 682acdbdbbaf20d303f0bc6b

Added to database: 5/19/2025, 6:20:45 AM

Last enriched: 7/2/2025, 1:57:38 PM

Last updated: 7/29/2025, 1:58:33 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats