Alert - TFlower Ransomware Campaign

Number: AL19-201
Date: 20 September 2019

Purpose

On 30 July 2019 a new variant of ransomware RansomwareA type of malware that denies a user's access to a system or data until a sum of money is paid. named TFlower was discovered. The Cyber Centre has become aware of this ransomware recently affecting the Canadian public.

Assessment

The initial infection vector for this malware MalwareMalicious software designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. appears to be through Remote Desktop services, and other infection vectors may include email spam and malicious attachments, deceptive downloads, botnets, malicious ads, web injects, fake updates and repackaged and infected installers. Once a malicious actor infects a system, they may attempt to move laterally across the network through tools such as PowerShell Empire, PSExec, etc.

The malware will initially contact a Command and Control(C2) server to indicate its readiness to encrypt the contents on the target system. It will then delete shadow copies and disable recovery features in Windows 10 and create persistence by adding a key in the logged in user's software registry hive. It will encrypt files and mark them by inserting the string "*tflower" at the beginning of the file but will not change the filename.

Finally the malware will update the C2 server and leave a ransom note named “!_Notice_!.txt” placed throughout the computer and on the Windows Desktop.

The Cyber Centre recommends that all system owners apply the latest security patches immediately, and that system users are reminded to be vigilant when following unsolicited links and opening unexpected document attachments in emails, even if they come from known contacts.

Suggested action

  • Install the latest updates for the vulnerable operating systems.
  • Disable Remote Desktop Services if not required. If required, closely monitor network traffic and the logs of any vulnerable systems for suspicious activity.
  • Enable Network Level Authentication (NLA) on all currently supported versions of Windows. This is a partial mitigation which will prevent the spread of the malware. With NLA enabled, an actor would first need to have credentials to an account on the target system.
  • Block TCP port 3389 on the firewall, if possible. This will prevent unauthorized access from the Internet.
  • Never open attachments from unknown or unverified sources.
  • Whitelist applications to prevent unauthorized applications from running.
  • Use antivirus and ensure that it is diligently kept up to date.
  • Minimize the number of users with administrative privileges and ensure users do not have privileges to install software on their devices without the authorization of an administrator.
  • Disable macros for documents received via email.
  • Follow the Government of Canada’s guidance to stay CyberSafe https://www.getcybersafe.gc.ca/index-en.aspx

References

CCCS Alert on Critical Remote Desktop Vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. : https://cyber.gc.ca/en/alerts/critical-microsoft-remote-desktop-vulnerability

Note to readers

The Canadian Centre for Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. (Cyber Centre) operates as part of the Communications Security Establishment. We are Canada's national authority on cyber security and we lead the government's response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure Critical infrastructureProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security, or economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be stand-alone or interconnected and interdependent within and across provinces, territories, and national borders. Disruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and significant harm to public confidence. , Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Date modified: