{"id":124754,"date":"2021-07-28T21:01:36","date_gmt":"2021-07-29T04:01:36","guid":{"rendered":"\/blogs\/?p=124754"},"modified":"2024-02-15T03:41:45","modified_gmt":"2024-02-15T11:41:45","slug":"babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/","title":{"rendered":"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?"},"content":{"rendered":"<p>Co-written with <a href=\"https:\/\/northwave-security.com\/\">Northwave<\/a>\u2019s No\u00ebl Keijzer.<\/p>\n<h2>Executive Summary<\/h2>\n<p>For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems. Yes, we observed the occasional dedicated Unix or Linux based ransomware, but cross-platform ransomware was not happening yet. However, cybercriminals never sleep and in recent months we noticed that several ransomware gangs were experimenting with writing their binaries in the cross-platform language Golang (Go).<\/p>\n<p>Our worst fears were confirmed when Babuk announced on an underground forum that it was developing a cross-platform binary aimed at Linux\/UNIX and ESXi or VMware systems. Many core backend systems in companies are running on these *nix operating systems or, in the case of virtualization, think about the ESXi hosting several servers or the virtual desktop environment.<\/p>\n<p>We touched upon this briefly in our <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-ransomware\/\" target=\"_blank\" rel=\"noopener\">previous blog<\/a>, together with the many coding mistakes the Babuk team is making.<\/p>\n<p>Even though Babuk is relatively new to the scene, its affiliates have been aggressively infecting high-profile victims, despite numerous problems with the binary which led to a situation in which files could not be retrieved, even if payment was made.<\/p>\n<p>Ultimately, the difficulties faced by the Babuk developers in creating ESXi ransomware may have led to a change in business model, from encryption to data theft and extortion.<\/p>\n<p>Indeed, the design and coding of the decryption tool are poorly developed, meaning if companies decide to pay the ransom, the decoding process for encrypted files can be really slow and there is no guarantee that all files will be recoverable.<\/p>\n<h2>Coverage and Protection Advice<\/h2>\n<p>McAfee\u2019s EPP solution covers\u00a0<strong>Babuk<\/strong>\u00a0ransomware with an array of prevention and detection techniques.<\/p>\n<p>McAfee ENS ATP provides behavioral content focusing on proactively detecting the threat while also delivering known IoCs for both online and offline detections. For DAT based detections, the family will be reported as\u00a0<em>Ransom-<strong>Babuk<\/strong>!<\/em>. ENS ATP adds 2 additional layers of protection thanks to JTI rules that provide attack surface reduction for generic ransomware behaviors and RealProtect (static and dynamic) with ML models targeting ransomware threats.<\/p>\n<p>Updates on indicators are pushed through GTI, and customers of Insights will find a threat-profile on this ransomware family that is updated when new and relevant information becomes available.<\/p>\n<p>Initially, in our research the entry vector and the complete tactics, techniques and procedures (TTPs) used by the criminals behind\u00a0<strong>Babuk<\/strong>\u00a0remained unclear.<\/p>\n<p>However, when its affiliate recruitment advertisement came online, and given the specific underground meeting place where\u00a0<strong>Babuk<\/strong>\u00a0posts, defenders can expect similar TTPs with\u00a0<strong>Babuk<\/strong>\u00a0as with other Ransomware-as-a-Service families.<\/p>\n<p>In its recruitment posting\u00a0<strong>Babuk<\/strong>\u00a0specifically asks for individuals with pentest skills, so defenders should be on the lookout for traces and behaviors that correlate to open source penetration testing tools like winPEAS, Bloodhound and SharpHound, or hacking frameworks such as CobaltStrike, Metasploit, Empire or Covenant. Also be on the lookout for abnormal behavior of non-malicious tools that have a dual use, such as those that can be used for things like enumeration and execution, (e.g., ADfind, PSExec, PowerShell, etc.) We advise everyone to read our blogs on evidence indicators for a targeted ransomware attack (<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">Part1<\/a>,\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/csi-evidence-indicators-for-targeted-ransomware-attacks-part-ii\/\" target=\"_blank\" rel=\"noopener\">Part2<\/a>).<\/p>\n<p>Looking at other similar Ransomware-as-a-Service families we have seen that certain entry vectors are quite common amongst ransomware criminals:<\/p>\n<ul>\n<li>E-mail Spearphishing (T1566.001). Often used to directly engage and\/or gain an initial foothold, the initial phishing email can also be linked to a different malware strain, which acts as a loader and entry point for the ransomware gangs to continue completely compromising a victim\u2019s network. We have observed this in the past with Trickbot and Ryuk, Emotet and Prolock, etc.<\/li>\n<li>Exploit Public-Facing Application (T1190) is another common entry vector; cyber criminals are avid consumers of security news and are always on the lookout for a good exploit. We therefore encourage organizations to be fast and diligent when it comes to applying patches. There are numerous examples in the past where vulnerabilities concerning remote access software, webservers, network edge equipment and firewalls have been used as an entry point.<\/li>\n<li>Using valid accounts (T1078) is and has been a proven method for cybercriminals to gain a foothold. After all, why break the door if you have the keys? Weakly protected Remote Desktop Protocol (RDP) access is a prime example of this entry method. For the best tips on RDP security, we would like to highlight our\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\" target=\"_blank\" rel=\"noopener\">blog<\/a>\u00a0explaining RDP security.<\/li>\n<li>Valid accounts can also be obtained via commodity malware such as infostealers, that are designed to steal credentials from a victim\u2019s computer. Infostealer logs containing thousands of credentials are purchased by ransomware criminals to search for VPN and corporate logins. As an organization, robust credential management and multi-factor authentication on user accounts is an absolute must have.<\/li>\n<\/ul>\n<p>When it comes to the actual ransomware binary, we strongly advise updating and upgrading your endpoint protection, as well as enabling options like tamper protection and rollback. Please read our\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ens-10-7-rolls-back-the-curtain-on-ransomware\/?hilite=%27roll%27%2C%27back%27\" target=\"_blank\" rel=\"noopener\">blog<\/a>\u00a0on how to best configure ENS 10.7 to protect against ransomware for more details.<\/p>\n<h2>Summary of the Threat<\/h2>\n<ul>\n<li>A recent forum announcement indicates that the Babuk operators are now expressly targeting Linux\/UNIX systems, as well as ESXi and VMware systems<\/li>\n<li>Babuk is riddled with coding mistakes, making recovery of data impossible for some victims, even if they pay the ransom<\/li>\n<li>We believe these flaws in the ransomware have led the threat actor to move to data theft and extortion rather than encryption<\/li>\n<\/ul>\n<p>Learn more about how\u00a0<strong>Babuk<\/strong> is transitioning away from an encryption\/ransom model to one focused on pure data theft and extortion in our detailed <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-babuk-moving-to-vm-nix-systems.pdf\" target=\"_blank\" rel=\"noopener\">technical analysis<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating&#8230;<\/p>\n","protected":false},"author":1150,"featured_media":125009,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[6297],"class_list":["post-124754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-29T04:01:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T11:41:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thibault Seret\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GlaCiuS_\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thibault Seret\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/\"},\"author\":{\"name\":\"Thibault Seret\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/231ed39216d37adb178e4649e84bff92\"},\"headline\":\"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?\",\"datePublished\":\"2021-07-29T04:01:36+00:00\",\"dateModified\":\"2024-02-15T11:41:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/\"},\"wordCount\":942,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/\",\"name\":\"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg\",\"datePublished\":\"2021-07-29T04:01:36+00:00\",\"dateModified\":\"2024-02-15T11:41:45+00:00\",\"description\":\"Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg\",\"width\":1680,\"height\":960,\"caption\":\"Business Trends Graphs and charts 3d image Reference Earth Map taken from open source: http:\/\/visibleearth.nasa.gov\/view_rec.php?vev1id=11656 Software used: 3dsMax Date of creation (rendered) - 26.08.2011 All layers used\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/231ed39216d37adb178e4649e84bff92\",\"name\":\"Thibault Seret\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4f4c0c76e29945c22b8ca66a4aed5588\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/Thibault_Seret-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/Thibault_Seret-96x96.jpg\",\"caption\":\"Thibault Seret\"},\"description\":\"Thibault Seret is a Security Researcher on the McAfee Advanced Threat Research team (McAfee ATR). He is currently focusing on ransomware analysis and research, reverse engineering and threat intelligence, and trying to fight against bad guys. Before joining ATR, he worked as a Cybercrime analyst in a banking institution with the mission to improve the digital forensics department, and as a CERT analyst on an IT services company where he tried to save the world with his teammate. He participates a lot in the security community and CTF competitions and is a teacher for the new generation of cyber defenders. For the Alliance !\",\"sameAs\":[\"https:\/\/x.com\/@GlaCiuS_\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/thibault-seret\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blog","description":"Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blog","og_description":"Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-07-29T04:01:36+00:00","article_modified_time":"2024-02-15T11:41:45+00:00","og_image":[{"width":1680,"height":960,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg","type":"image\/jpeg"}],"author":"Thibault Seret","twitter_card":"summary_large_image","twitter_creator":"@GlaCiuS_","twitter_site":"@McAfee","twitter_misc":{"Written by":"Thibault Seret","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/"},"author":{"name":"Thibault Seret","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/231ed39216d37adb178e4649e84bff92"},"headline":"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?","datePublished":"2021-07-29T04:01:36+00:00","dateModified":"2024-02-15T11:41:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/"},"wordCount":942,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/","name":"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg","datePublished":"2021-07-29T04:01:36+00:00","dateModified":"2024-02-15T11:41:45+00:00","description":"Co-written with Northwave\u2019s No\u00ebl Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/Threat-intel-05-iStock-1143391583.jpeg","width":1680,"height":960,"caption":"Business Trends Graphs and charts 3d image Reference Earth Map taken from open source: http:\/\/visibleearth.nasa.gov\/view_rec.php?vev1id=11656 Software used: 3dsMax Date of creation (rendered) - 26.08.2011 All layers used"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/babuk-biting-off-more-than-they-could-chew-by-aiming-to-encrypt-vm-and-nix-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/231ed39216d37adb178e4649e84bff92","name":"Thibault Seret","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4f4c0c76e29945c22b8ca66a4aed5588","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/Thibault_Seret-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/Thibault_Seret-96x96.jpg","caption":"Thibault Seret"},"description":"Thibault Seret is a Security Researcher on the McAfee Advanced Threat Research team (McAfee ATR). He is currently focusing on ransomware analysis and research, reverse engineering and threat intelligence, and trying to fight against bad guys. Before joining ATR, he worked as a Cybercrime analyst in a banking institution with the mission to improve the digital forensics department, and as a CERT analyst on an IT services company where he tried to save the world with his teammate. He participates a lot in the security community and CTF competitions and is a teacher for the new generation of cyber defenders. For the Alliance !","sameAs":["https:\/\/x.com\/@GlaCiuS_"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/thibault-seret\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1150"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=124754"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124754\/revisions"}],"predecessor-version":[{"id":182690,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/124754\/revisions\/182690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125009"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=124754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=124754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=124754"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=124754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}