Lockbit 3.0 Ransomware Attack Demo

JuniperNetworks
3 Mar 202308:16

Summary

TLDRThis demonstration showcases the capabilities of the Juniper SRX firewall in identifying and isolating Lockbit 3.0 ransomware attacks. The script details the ransomware's operation, encryption methods, and the SRX's proactive detection using machine learning. It also illustrates the firewall's response to infected hosts by blocking them at threat levels 8-10 and the process of reconnecting a cleaned system to the network.

Takeaways

  • ๐Ÿ”’ The Juniper SRX firewall is capable of identifying Lockbit 3.0 ransomware and isolating infected hosts.
  • ๐Ÿ’ฅ The Lockbit ransomware gang was notably active in 2022, targeting high-profile businesses and government organizations.
  • ๐Ÿ› ๏ธ A disgruntled developer allegedly leaked the private ransomware Builder, which was disputed by a public spokesperson of the Lockbit gang.
  • ๐Ÿ“… The Lockbit 3.0 operation started in June 2022 and continues to be a threat to businesses.
  • ๐Ÿ›‘ The ransomware Builder allows customization of encryption parameters, including processes to stop and files not to encrypt.
  • ๐Ÿ“ The ransomware files lb3.exe and lb3pass.exe are created upon building the ransomware with the Builder.
  • ๐Ÿ” A password is required for the lb3pass.exe decryptor, which is used to evaluate sandboxes.
  • ๐Ÿ’ป The script demonstrates the encryption of files on a Windows client and the modification of file icons by the ransomware.
  • ๐Ÿ“ A ransom note, readme.txt, is included by the ransomware, providing instructions to contact the operator for decryption.
  • ๐Ÿšจ The SRX firewall proactively detected the ransomware using a machine learning model engine, scoring the host at Threat Level 9.
  • โ›”๏ธ The SRX firewall, configured to block at Threat Level 8 to 10, successfully disconnected the infected host from the network.
  • ๐Ÿ”„ After cleaning the infected host, the status can be changed in the Security Director to 'Resolved and Fixed' to reconnect the host to the network.

Q & A

  • What is the Lockbit 3.0 ransomware and what is its significance?

    -Lockbit 3.0 is a type of ransomware that has been particularly prevalent in 2022, known for high-profile cyber attacks, including those targeting government organizations. It encrypts files and demands ransom for their decryption.

  • How did the Lockbit ransomware builder become publicly available?

    -A person on Twitter claimed to have hacked Lockbit servers and obtained the builder. However, a public spokesperson for the Lockbit gang disputed this, suggesting instead that a disgruntled developer leaked the private ransomware builder.

  • What is the purpose of the configuration file in the Lockbit ransomware builder?

    -The configuration file allows the customization of various parameters for the ransomware, such as encryption mode, processes and services to stop, and files and directories not to encrypt.

  • How does the Lockbit ransomware builder create the ransomware files?

    -When the build button is clicked, the ransomware builder creates lb3.exe and lb3pass.exe files in the build folder, along with a decryptor that requires a password for use.

  • What is the role of Wireshark in the demonstration of the Lockbit ransomware attack?

    -Wireshark is used to monitor the HTTP downloads that occur during the ransomware attack, providing visibility into the network traffic and file transfers.

  • How does the SRX firewall detect the Lockbit ransomware attack?

    -The SRX firewall uses a machine learning model engine for proactive detection of malware behaviors, scoring the threat level and blocking infected hosts based on predefined policies.

  • What is the Threat Level configuration for blocking infected hosts and HTTP downloads in the SRX firewall?

    -The SRX firewall is configured to block infected hosts at Threat Level 8 to 10 and to block HTTP downloads at a threat score level of 7 to 10.

  • What happens when a host is detected as infected by the SRX firewall?

    -When a host is detected as infected, the SRX firewall disconnects it from the network to prevent further spread of the malware, as per the configured threat level policies.

  • How can an infected host be reconnected to the network after being cleaned?

    -After the host is cleaned and no longer infected, the investigation status can be changed to 'Resolved and Fixed' in the Security Director, which will allow the machine to reconnect to the network.

  • What is the role of the Security Director in managing the SRX and its policies?

    -The Security Director, Juno Space, is used to manage the SRX firewall and its policies, including threat prevention configurations and handling of infected hosts.

  • What is the significance of the ransom note 'readme.txt' included by the ransomware?

    -The 'readme.txt' ransom note contains instructions on how to contact the ransomware operator to negotiate the decryption of the files, which is a common tactic used by ransomware to extort money from victims.

Outlines

00:00

๐Ÿ›ก๏ธ Juniper SRX Firewall's Ransomware Detection and Isolation

This paragraph demonstrates the capabilities of the Juniper SRX firewall in identifying and isolating Lockbit 3.0 ransomware. The Lockbit ransomware gang was notably active in 2022, targeting businesses and government organizations. The demonstration involves creating the ransomware using a Builder, which can be configured to set encryption modes and define parameters such as processes to stop and files not to encrypt. The ransomware, once launched, encrypts files and modifies their icons, leaving a ransom note with instructions for decryption. The SRX firewall is shown to detect the attack through behavioral analysis, using a machine learning model engine, and isolates the infected host by disconnecting it from the network until it's cleaned and deemed safe to reconnect.

05:01

๐Ÿ”’ SRX Firewall's Response to Ransomware Infection

The second paragraph details the SRX firewall's response to a detected ransomware infection. Once the ransomware, identified as lb3.exe and lb3_pass.exe, is downloaded from an HTTP server, the security director detects it proactively using machine learning. The infected host is scored at Threat Level 9 due to the malicious file download, triggering the SRX to block the host from the network. This isolation prevents further communication with the infected machine until it is cleaned. After remediation, the security director can change the investigation status to 'Resolved and Fixed,' allowing the machine to reconnect to the network and regain internet connectivity, ensuring the system's security and integrity.

Mindmap

Keywords

๐Ÿ’กJuniper SRX firewall

Juniper SRX firewall is a network security device designed to protect against various threats, including ransomware. In the context of the video, it plays a crucial role in identifying and isolating infected hosts during a ransomware attack. The script describes how the SRX firewall is configured to detect malicious activities and block infected hosts at certain threat levels, demonstrating its proactive security capabilities.

๐Ÿ’กLockbit 3.0

Lockbit 3.0 is a type of ransomware that encrypts files and demands payment for their decryption. The script mentions that the Lockbit ransomware gang was responsible for high-profile cyber attacks in 2022. The video demonstrates the creation and operation of Lockbit 3.0 ransomware, including its encryption process and the inclusion of a ransom note for the victims.

๐Ÿ’กRansomware attack

A ransomware attack is a cyber threat where an attacker encrypts a victim's files and demands payment to restore access. The video script provides an example of such an attack, detailing the steps taken by the attacker to infect a host with Lockbit 3.0 and the subsequent encryption of files on the victim's computer.

๐Ÿ’กRansomware Builder

The Ransomware Builder is a tool used to create custom ransomware. In the script, it is mentioned that a disgruntled developer leaked the private Ransomware Builder, which was then used to create the Lockbit 3.0 ransomware. The Builder allows for customization of encryption modes and other parameters, highlighting the adaptable nature of ransomware threats.

๐Ÿ’กEncryption mode

Encryption mode refers to the specific method used by ransomware to encrypt files. The script explains that the Ransomware Builder allows the attacker to define the encryption mode, which is a key aspect of how the ransomware operates and affects the victim's files.

๐Ÿ’กThreat Level

Threat Level is a measure used by security systems, like the Juniper SRX firewall, to evaluate the severity of a potential threat. The script describes the SRX firewall's configuration to block infected hosts at Threat Level 8 to 10, indicating the system's sensitivity to high-risk threats.

๐Ÿ’กThreat score

Threat score is a numerical value assigned to a potential threat, indicating its level of danger. The video script mentions that the SRX firewall is configured to block HTTP downloads at a threat score level of 7 to 10, demonstrating how the system uses scoring to determine the appropriate response to detected threats.

๐Ÿ’กBehavioral analysis

Behavioral analysis is a method of detecting malware by observing its behavior on a system. The script notes that the SRX firewall detected the ransomware proactively using a machine learning model engine, which performed a behavioral analysis of the downloaded files.

๐Ÿ’กMachine learning model engine

A machine learning model engine is a component of security systems that uses machine learning algorithms to identify and respond to threats. In the video, it is highlighted as the technology enabling the SRX firewall to detect the Lockbit 3.0 ransomware through its behavioral patterns.

๐Ÿ’กSecurity Director

Security Director is a management tool used to configure and monitor security devices like the Juniper SRX firewall. The script describes using the Security Director to manage SRX policies and to detect and respond to the ransomware attack, showcasing its role in network security management.

๐Ÿ’กIsolation

Isolation is a security measure where a compromised system is disconnected from the network to prevent the spread of malware. The video script explains how the SRX firewall isolates the infected Windows client by disconnecting it from the network until it is cleaned and no longer poses a threat.

Highlights

Demonstration of Juniper SRX firewall identifying Lockbit 3.0 ransomware.

Lockbit ransomware gang was one of the most prevalent attackers of businesses in 2022.

Controversy over the hacking of Lockbit servers and the release of the ransomware Builder.

Lockbit 3.0 operation began in June 2022 and continues to infect businesses.

Explanation of how the ransomware operates and encrypts files using a Builder.

Creation of ransomware files lb3.exe and lb3pass.exe using the Builder.

Use of a password for lb3pass.exe as a method to evade sandbox analysis.

Infection simulation on a Windows computer with visible documents on the desktop.

Wireshark used to monitor HTTP downloads during the ransomware attack.

Files on the desktop encrypted with a delay and modified file icons.

Inclusion of a ransom note readme.txt with instructions for decryption.

Simulation of the ransomware attack with the SRX firewall involved.

SRX firewall's detection capabilities using a machine learning model engine.

SRX firewall configured to block infected hosts at Threat Level 8 to 10.

Disconnection of the infected host from the network by the SRX firewall.

Process to reconnect a cleaned and disinfected host back to the network.

Restoration of network connectivity to the cleaned Windows client.

Transcripts

play00:02

this demonstration shows how the Juniper

play00:05

SRX firewall can identify lockbit 3.0

play00:08

ransomware and isolate an infected host

play00:10

in the context of renssware attack in

play00:13

2022 the log bit ranswer gang was among

play00:16

the most prevalent ransomware to strike

play00:18

businesses they were responsible for

play00:20

high profile cyber attacks including the

play00:23

government organizations

play00:25

on September 21st 2022 someone on

play00:28

Twitter claimed that they were able to

play00:30

hack lockbit servers and get a hold of

play00:32

the Builder

play00:33

a public spokesperson of luck bit gang

play00:36

though disputed the heck

play00:38

instead a disgruntled developer leaked

play00:41

the private ransomware Builder

play00:43

the lockbit 3.0 operation began in June

play00:46

2022 and is still infecting businesses

play00:48

as to date

play00:54

we'll demonstrate how this attack

play00:56

operates and encrypts files we will

play00:59

create the ransomware using the Builder

play01:01

and host it on the HTTP server

play01:03

Powershell will then be used to launch

play01:05

the attack on a Windows client

play01:07

the compromise Builder consists of

play01:09

builder.exe and the configuration file

play01:12

that may be edited to define various

play01:14

parameters such as encryption mode the

play01:17

processes the services to stop and the

play01:19

files and directories not to encrypt

play01:26

when you click on build.back the

play01:29

ransomware files lb3.exe and

play01:32

lb3pass.exe will be created in the build

play01:35

folder there's also the decryptor a

play01:38

password is necessary for the

play01:40

lb3pass.exe to infect the system

play01:43

they use this as one method of evaling

play01:46

sandboxes

play02:08

in the next section we'll infect the

play02:10

Windows computer some documents can be

play02:12

seen on the desktop to show that lock

play02:14

bit encrypt these files

play02:16

Wireshark is launched in order to

play02:18

monitor the HTTP downloads

play02:21

using Powershell and the command prompt

play02:23

we launched the attack

play02:25

as you can see it downloads lb3.exe and

play02:29

lbb.txt the Powershell script

play02:32

the files on the desktop are now

play02:34

encrypted after a little delay

play02:37

the encrypted file icons were also

play02:40

Modified by the ransomware

play02:41

you can see that the files are rather

play02:44

heavily encrypted if you open them in a

play02:46

text editor

play02:58

they also included a ransom note

play03:00

readme.txt that contains instructions on

play03:03

how to get in touch with the ransomware

play03:05

operator to have your files decrypted

play03:14

in the following we will simulate the

play03:16

attack with the SRX involved to show how

play03:19

the SRX firewall will be able to detect

play03:21

this attack

play03:22

the following diagram shows you the

play03:24

components used in this demonstration an

play03:27

SRX client is involved attached to it

play03:30

are several Windows hosts an Ubuntu

play03:32

machine is also attached to it which

play03:35

will act as the malware server

play03:37

a security director Juno space is also

play03:40

included which will be used to manage

play03:42

our SRX and policies we will use the

play03:45

windows client pc1 to launch the attack

play03:49

from our jump station we log into the

play03:51

security director which we'll use to

play03:53

manage our SRX and our policies

play03:58

we will go to configure threat

play04:01

prevention and then the policies

play04:06

as you can see it's configured to block

play04:09

infected host at Threat Level 8 to 10.

play04:29

for HTTP downloads it is configured to

play04:32

block at a threat score level 7 to 10.

play04:39

using RDP we're connecting to one of the

play04:42

windows clients that we're going to

play04:43

infect before we begin we want to make

play04:46

sure that this client has internet

play04:48

connectivity

play04:55

next using the command line we execute

play04:58

the attack in the background you can see

play05:00

Wireshark and the files being downloaded

play05:03

from the HTTP server

play05:21

if we go back to security director we

play05:24

can see that it has detected the

play05:26

ransomware

play05:27

lb3.exe and lb3 underscore pass.exe

play05:32

we can click on the file to see more

play05:34

details about the specific download

play05:40

under the behavioral analysis we can see

play05:43

the behaviors that have been seen

play05:46

it is important to note that this

play05:48

malware was detected proactively using

play05:50

the machine learning model engine

play06:00

if we look at the host it was scored at

play06:02

Threat Level 9 and it shows that this

play06:05

was because of a downloaded malicious

play06:07

file

play06:08

since our SRX is configured to block

play06:10

host at Threat Level 8 through 10 it

play06:13

will disconnect this host from the

play06:15

network

play06:24

since this host is disconnected from the

play06:26

network we're not able to Ping to this

play06:29

machine or connect to it via RDP

play07:09

once the machine is cleaned and is no

play07:12

longer infected we can go back to

play07:14

security director to get this machine

play07:16

back on the network in order to do this

play07:19

we change the investigation status back

play07:22

to resolved and fixed which will put the

play07:25

machine back on the network

play07:38

as you can see we can once again ping

play07:41

the machine and connect to it

play07:56

the windows client is now connected back

play07:59

to the network and has internet

play08:00

connectivity once again

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
Juniper SRXRansomwareLockbit 3.0CybersecurityEncryptionFirewallThreat DetectionNetwork IsolationMachine LearningSecurity Protocols