Bad Rabbit is a strain of ransomware that first appeared in 2017 and is a suspected variant of Petya. Like other strains of ransomware, Bad Rabbit virus infections lock up victims’ computers, servers, or files preventing them from regaining access until a ransom—usually in Bitcoin—is paid.
Like other strains of ransomware, Bad Rabbit virus locks up victims’ computers, servers, or files prevents them from regaining access until a ransom—usually in Bitcoin—is paid.
If a person clicks on the malicious installer, BadRabbit ransomware encrypts files and presents users with an austere black-and-red message. It reads in part: “If you see this text, your files are no longer accessible. You might have been looking for a way to recover your files. Don’t waste your time.”
The text demands around $280 in Bitcoin and gives a 40-hour deadline for payments to be made. Victims reported that making the payment did unlock their files, though this isn’t always the case in other ransomware attacks.
Ransomware such as Bad Rabbit attacks a network in one of two ways: as an encryptor (as is the case with Bad Rabbit malware) or as a screen locker. Encryptors lock data on a targeted system, making the content inaccessible without a decryption key. A screen locker simply blocks access to the system via a lock screen that simply claims that the system is encrypted.
In either case, preventing Bad Rabbit ransomware is a far better option than remediating it.
Once you realize that you are the victim of Bad Rabbit ransomware attack, follow these steps to respond:
- Contact law enforcement.
- Disconnect from any computers, servers or other equipment your network.
- Determine the scope of the problem based on your knowledge of threat intelligence.
- Orchestrate a response. Some types of ransomware, such as screen lockers, are easier to remediate. Others may require completely re-imaging (wiping) systems and recovering files from backup.
- Look for free ransomware decryption tools—but don’t rely on them. They don’t work for every type of ransomware and may not help you get your files back.
- Restore captive files from your backup systems.
 Lena Fuks (Security Boulevard). “10 Ransomware Attacks You Should Know About in 2019”
 Proofpoint. “Ransomware is Big Business”
 Proofpoint. “The Ransomware Survival Guide”
Tips for Developing Your Ransomware Defense Strategy
At Proofpoint, we spend a lot of time with clients talking about incident response strategies. Explore best practices for developing a ransomware defense strategy.
What Is Ransomware?
Discover what ransomware is and how to prevent ransomware attacks. Learn the definition, history, detection, and how Proofpoint helps organizations not become victims.
Latest Cybersecurity Threats
Stay current on the latest security threats and cyber attacks with Proofpoint. Protect your employees, data, and brand from today's advanced threats.