Clicky

‘Black Kingdom’ Ransomware Hits Unpatched Exchange Servers

Email Security & Protection
,
Endpoint Security
,
Fraud Management & Cybercrime

Attack Code ‘Rudimentary and Amateurish’ But Still a Threat

'Black Kingdom' Ransomware Hits Unpatched Exchange Servers
Ransom note left by Black Kingdom (Source: MalwareTech)

Attackers gunning for an easy pay day are continuing to target Microsoft Exchange servers that have not yet been updated with critical patches.

See Also: Live Webinar | Mitigating the Risks Associated with Remote Work


On Thursday, security experts began warning that a new strain of ransomware had begun targeting Exchange email servers that have not yet been updated with the patch Microsoft issued on March 2 for a ProxyLogon flaw in Exchange.


But the new crypto-locking malware, called Black Kingdom, has been branded “rudimentary and amateurish” by Mark Loman, director of engineering at security firm Sophos, who says it appears to have been dashed off by a “motivated script-kiddie.”


Black Kingdom may rank as a minor problem facing organizations that have yet to install the security patches to fix four critical flaws, issued by Microsoft early this month, for all on-premises versions of Exchange.


Security firms have warned of a surge in attack attempts – and thousands of victims – as more than a dozen groups have already been targeting the flaws, with some doing so as early as January – before the vulnerabilities were public knowledge. As a result, even once organizations have patched the flaws, they must still review their infrastructure for signs that they had already been compromised (see: Microsoft Exchange: Server Attack Attempts Skyrocket).


Last week, security firm RiskIQ estimated that more than 450,000 on-premises Exchange servers remained unpatched, of which the majority were located in the U.S.


Referencing more recent scans by RiskIQ, Microsoft says more organizations have installed the Exchange security updates over the past week, although as of Sunday, at least 29,000 on-premises Exchange mail servers remained unpatched.


After proof-of-concept exploits for the flaws were released beginning on March 13, security firm F-Secure reported that the number of attackers attempting to use them to plant web shells on unpatched Exchange systems soared.


Enter Black Kingdom

Black Kingdom is the latest attempt by attackers to target one of the Exchange flaws – and in particular, the ProxyLogon flaw designated CVE-2021-26855, which can be used to remotely execute code.




A later version of Black Kingdom’s ransom note (Source: Sophos)

While the ransomware didn’t appear to work correctly when it first appeared, in recent days, several security firms – including Arete IR, Sophos and Speartip – report that the developer has continued to refine the code, which can now crypto-lock systems.


The attack campaign appears to have notched up at least one victim, who on Thursday paid a ransom in bitcoins worth about $9,400.


Threat-intelligence vendor Recorded Future’s news site The Record also reports that at least one automotive supplier appears to have fallen victim to a Black Kingdom infection and is remediating the attack.


“The encryption tools and techniques are imperfect but the ransom of $10,000 in bitcoins is low enough to be successful,” Loman says. “Every threat should be taken seriously, even seemingly low-quality ones.”







Loman recently described another low-quality attack attempt called DearCry, noting that numerous aspects of that ransomware “suggest that DearCry may be a prototype, possibly rushed into use to seize the opportunity presented by the Microsoft Exchange Server vulnerabilities, or created by less experienced developers.” (See: Rushed to Market: DearCry Ransomware Targeting Exchange Bug)



Loman notes in a detailed technical teardown of Black Kingdom based on the attack chain seen by Sophos that if the attack successfully exploited the ProxyLogon flaw to gain access to the server, “the adversary delivered a webshell,” which “offers remote access to the server and allows the execution of arbitrary commands,” After that, the attacker used PowerShell to download a ransomware executable – written in Python – from an external address, then ran a script.




“The script executes the ransomware by invoking Win32_Process via WMI – the Windows Management Interface. The script includes the ability to upload the ransomware to other computers on the network and execute it,” Loman says.


The ransomware makes a number of mistakes, Loman says, including failing to check if a system has already been crypto-locked before attempting to encrypt it.


“As a result, the encrypted files can become encrypted multiple times over, even by the same ransomware, making decryption extremely complicated,” he says. “This oversight is probably unintentional, but could have been anticipated.”


Ransomware Revised in Recent Days

In fact, malware researcher Marcus Hutchins, aka MalwareTech, says that as of Sunday, coding errors meant that Black Kingdom wasn’t able to crypto-lock systems, but only to drop a ransom note. As a result, it previously functioned not as ransomware, but just scareware.


Hutchins says the attacker attempted to execute a Python script, which, if executed, claimed that files had been stolen, when they had not. “Seems to be total skidware and it’s unclear how many systems it successfully ran on, if any,” he tweeted.



But in recent days, Black Kingdom’s developer appears to have added working crypto-locking functionality – albeit imperfectly.


Kevin Beaumont, a security researcher at Microsoft, reported Tuesday that a newer version of Black Kingdom had begun inexpertly crypto-locking too many file types – such as storage drivers, which can leave infected systems unable to reboot. As a result, victims wouldn’t be able to access any ransom note, meaning there would be no possibility of a payday for attackers.





Previous Black Kingdom Targeted Pulse Secure


An earlier version of ransomware called Black Kingdom was spotted in June 2020 by Poland-based cybersecurity firm Redteam.PL, which said it had discovered the malicious code was targeting Pulse Secure VPNs that hadn’t been patched to fix an arbitrary file-reading vulnerability, designated CVE-2019-11510 (see: Ransomware: Beware of 13 Tactics, Tools and Procedures).


The attackers were demanding about $10,000 worth of bitcoins and claimed they’d leave a victim’s data unrecoverable if the ransomware wasn’t paid within 600 minutes, Securityweek reported at the time.


Other attack groups had already been targeting the Pulse Secure flaw long before Black Kingdom debuted, beginning in August 2019, before expanding in January 2020 to include the notorious Sodinokibi – aka REvil – ransomware-as-a-service operation (see: Patch or Perish: VPN Servers Hit by Ransomware Attackers).


Security firm Spearpoint notes that the previous ransomware named Black Kingdom also packaged the malicious executable in a Python script.


Experts Urge: Patch or Disconnect Servers


Sophos’ Loman says the two strains of ransomware sharing the same name may, of course, be related.


For all organizations running Microsoft Exchange servers on-premises, however, the immediate imperative isn’t attribution, but rather to patch the four critical flaws and then continuously monitor the infrastructure for signs it was already compromised.



Text of Black Kingdom’s ransom note, as contained in a file named decrypt_file.TxT that is stored alongside encrypted data (Source: Sophos)

“Defenders should take urgent steps to install Microsoft’s patches to prevent exploitation of their Exchange server,” Loman says. “In addition, the Exchange server should be scanned for web shells that allow attackers run commands on the server. If this is not possible, the server should be disconnected from the internet or closely monitored by a threat response team.”



Scroll to Top