Meet Rombertik, A Deadly Virus That Will Self-Destruct And Destroy Your Computer Once You Detect It

A new malware is on the prowl. Meet Rombertik, a deadly virus that self-destructs your computer once you detect the malware.

Unlike most computer viruses, Rombertik attempts to avoid detection or analysis by simply making the device it has infected unusable. The “unique” virus resists capture pretty aggressively and, upon detection, begins to delete files on the PC. The virus makes the machine reboot constantly in loop as its evasion mechanism is triggered. The malware also steals a user’s login data and other sensitive information.

If Rombertik is successful in avoiding detection in the initial stages, then it installs itself on the AppData and startup folders. At some point, it replaces itself with a new unpacked executable. Once the virus is deeply embedded into the system, the malware is able to perform constant checks against the “unpacked sample.”

While Rombertik doesn’t exactly destroy the infected machine, it does erase the partition sector of the hard drive—the Master Boot Record (MBR)—and force a machine restart when it senses detection.

If any changes to erase or quarantine it are detected, then Rombertik attacks the MBR and puts it in the restart loop. If it is unsuccessful in its attempts, then Rombertik tries to encrypt files stored in the home folder.

The elusive virus was identified by researchers from the Cisco-led Talos Security Intelligence and Research Group. Rombertik has “multiple layers of obfuscation and anti-analysis functionality.”

How does Rombertik install itself on a device?

When a user clicks on attachments that accompany malicious e-mails, the self-destructing virus installs itself in that particular computer.

“Rombertik has been identified to propagate via spam and phishing messages sent to would-be victims … At a high level, Rombertik is a complex piece of malware that is designed to hook into the user’s browser to read credentials and other sensitive information for exfiltration to an attacker controlled server, similar to Dyre. However, unlike Dyre which was designed to target banking information, Rombertik collects information from all websites in an indiscriminate manner,” explained Ben Baker and Alex Chiu of Cisco.

How does Rombertik manage to avoid detection?

Rombertik has devised several methods to avoid being detected and analyzed.

1. The Rombertik executable contains a massive amount of “garbage code,” which the malware does not utilize. This aids it in inflating the volume of the code, which analysts need to assess and review, succeeding in confusing identification processes.

2. The malware also writes a single byte of arbitrary data to the memory a whopping 960 million times. This is effective in misleading sandboxes into thinking the virus to be a regular program. It ends up growing the data log to over 100GB, which is a time-consuming process and further complicates the analysis and detection of the malware.

Source: techtimes.com

Koristimo kolačiće kako bi poboljšali Vaše korisničko iskustvo i funkcionalnost stranice. Više informacija o kolačićima možete pronaći ovdje.

Ključni su za upotrebu Internet stranice i bez istih stranica nema svoju punu funkcionalnost. Nastavkom surfanja i kupovinom neophodni se kolačići smatraju prihvaćenima. Funkcionalni kolačići mogu uključivati kolačiće koji pružaju uslugu koju je korisnik zatražio.

cookies_permission

Za pohranu prihvaćanja kolačića.

Ističe: 1 godina

Vrsta: HTTP

Prikupljaju se anonimno, ne mogu pratiti aktivnosti korisnika na drugim Internet stranicama i služe za praćenje ponašanja korisnika te u svrhu mjerenja ponašanja publike i sastavljanja izvješća za poboljšanja Internet stranice. Ovi kolačići omogućuju prijenos podataka u treće zemlje, uključujući SAD.

cookies_permission_analiza

Za pohranu prihvaćanja analitičkih kolačića.

Ističe: 1 godina

Vrsta: HTTP

sbjs_current

Za pohranu detalja preglednika.

Ističe: Sesija

Vrsta: HTTP

sbjs_current_add

Dodatni metapodaci o izvoru prometa trenutne sesije korisnika.

Ističe: Sesija

Vrsta: HTTP

sbjs_first

Bilježi izvor prometa prvog posjeta korisnika web stranici (npr. izvorni UTM parametri).

Ističe: 6 mjeseci

Vrsta: HTTP

sbjs_first_add

Pohranjuje dodatne pojedinosti o izvoru prometa za prvi posjet korisnika.

Ističe: 6 mjeseci

Vrsta: HTTP

sbjs_migrations

Prati prijelaze između izvora prometa, primjerice kada korisnik mijenja kampanje ili preporuke.

Ističe: 6 mjeseci

Vrsta: HTTP

sbjs_session

Prati podatke o prometu specifične za sesiju, kao što je izvor preporuke za trenutni posjet.

Ističe: Sesija

Vrsta: HTTP

sbjs_udata

Pohranjuje skupne korisničke podatke, kao što je kombinacija izvora prometa kroz posjete.

Ističe: 6 mjeseci

Vrsta: HTTP

Kolačići su male tekstne datoteke koje internetske stranice koriste kako bi unaprijedile korisničko iskustvo.

Zakon dopušta spremanje kolačića na vaš uređaj ako je to izričito potrebno za rad stranice. Za sve ostale vrste kolačića trebamo vašu suglasnost.

Ove stranice koriste različite vrste kolačića. Neke kolačiće postavljaju usluge trećih strana koje se prikazuju na našim stranicama.

Vašu suglasnost za Izjavu o kolačićima na našim internetskim stranicama možete u bilo kojem trenutku promijeniti ili povući.

Više informacija o tome tko smo mi, kako nas možete kontaktirati i kako obrađujemo vaše osobne podatke možete pronaći u našoj Politici privatnosti.

Molimo vas da pri kontaktiranju vezano za vašu suglasnost navedete svoj ID broj suglasnosti i datum isteka iste.