Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

B0r0nt0K (Rontok) Ransomware (website encrypted with .rontok)


  • Please log in to reply
23 replies to this topic

#1 magicker

magicker

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 22 February 2019 - 03:04 PM

Hi there
A client of mine had their web site encrypted. Demanding 20 BC (£60 000!!!) for keys (the site cant make that in a decade)
 
the extension is 
 
.rontok
 
for which I cant find a single reference on the net.
 
bc address: 3P8nU1oLe23DtSuzFQMoVJdqcJA6xKnVJC[/size]
 
the server us running ubuntu 16.04


Edited by quietman7, 25 February 2019 - 09:32 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:14 AM

Posted 22 February 2019 - 04:23 PM

Malware developers targeting entire websites with ransomware is not new but I have not read any recent reports.
 

Did they leave a ransom note and if so, what is the actual name of the ransom note?
Can you provide the ransom note contents?
Did the cyber-criminals provide an email address to send payment to? If so, what is the email address?
 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#3 magicker

magicker
  • Topic Starter

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 22 February 2019 - 04:30 PM

unfortunately all we have is a screen shot of the ransom note (no one seems to recall actually deleting the note but we can no longer find it)
 

https://www.screencast.com/t/fJ7pQNS9TZUP

 

email : info@borontok.uk

 

which linked to https://borontok.uk

 

https://www.screencast.com/t/IVPUG3kDGs



#4 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:14 AM

Posted 22 February 2019 - 04:43 PM

Our crypto malware experts most likely will need a sample of the malware file itself to analyze before the type of infection can be confirmed.

If you can find any, samples of any suspicious executable's (installer, malicious files, attachments) that you suspect were involved in causing the infection can be submitted (uploaded) here with a link to this topic...it's best to zip (compress) all files before sharing. There is a "Link to topic where this file was requested" box under the Browse button.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#5 magicker

magicker
  • Topic Starter

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 22 February 2019 - 06:30 PM

The only files present are the encrypted data files.. there do not appear to be any tools installed to encrypt the files.



#6 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:14 AM

Posted 22 February 2019 - 07:41 PM

If that is all you have, then submit (upload) samples to ID Ransomware (IDR) for Demonslay335 (Michael Gillespie) to manually inspect the files. Maybe he can get some information from them

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#7 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:06:14 PM

Posted 23 February 2019 - 01:38 AM

magicker

 

They used and play with the name of the virus Brontok, which was more than 12-13 years ago.
tWOT8AP.png
 
Of course, he is hardly active now, but his name is now used in this Ransomware.
 
You need send me several encrypted files so that can more accurately identify the program.
 
Use free services for transfer this files to PM:
 
It is necessary to act immediately, without delay.

Edited by Amigo-A, 23 February 2019 - 03:51 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#8 magicker

magicker
  • Topic Starter

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 23 February 2019 - 02:53 AM

If that is all you have, then submit (upload) samples to ID Ransomware (IDR) for Demonslay335 (Michael Gillespie) to manually inspect the files. Maybe he can get some information from them

I have uploaded a few samples via the form



#9 magicker

magicker
  • Topic Starter

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 23 February 2019 - 03:53 AM

 

magicker

 

They used and play with the name of the virus Brontok, which was more than 12-13 years ago.
tWOT8AP.png
 
Of course, he is hardly active now, but his name is now used in this Ransomware.
 
You need send me several encrypted files so that can more accurately identify the program.
 
Use free services for transfer this files to PM:
 
It is necessary to act immediately, without delay.

 

 

samples sent .. many thanks for your time



#10 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:06:14 PM

Posted 23 February 2019 - 04:27 AM

ok. I looked and sent the link to Demonslay335.

 

In my Digest this Rw now described as Rontok Ransomware


Edited by Amigo-A, 23 February 2019 - 03:05 PM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#11 magicker

magicker
  • Topic Starter

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 23 February 2019 - 04:40 AM

Just to be clear this is a web server running Ubuntu 16.04



#12 Demonslay335

Demonslay335

    Ransomware Hunter


  •  Avatar image
  • Security Colleague
  • 4,770 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:14 AM

Posted 23 February 2019 - 10:35 AM

Do you remember what the ransom note name, and or extension of it was? Looks like a form, so I would suspect either .html or .php. Based on the encrypted files and their filenames, I can only suspect it is using a block cipher of 16 bytes (e.g. AES), which is basically de-facto for ransomware. The filenames are encrypted and base64 encoded (with URL encoding, thus the %2B and %3D), which is quite interesting. The files themselves as you may have seen are encrypted then saved as base64, which is unnecessary for sure.

 

We'll definitely need a sample of the malware to analyze. I'm suspecting it could be a PHP script, just based on the odd choice of encoding.

 

If you could share more details about the web site itself in PM, I can see if they provide any clues. E.g. was it a CMS and what version.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#13 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:14 AM

Posted 23 February 2019 - 11:08 AM

This is an example from a couple years ago...PHP (Troj/PHPRansm) ransomware attacks blogs, websites, content managers

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#14 3kt0

3kt0

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:14 AM

Posted 25 February 2019 - 01:09 PM

Hey, guys! Have you gotten news on that? Were you able to get the hash?

 

Thank you!



#15 magicker

magicker
  • Topic Starter

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  

Posted 25 February 2019 - 01:36 PM

 I have spoken to all involved and no one knows where the ransom note / encryption / decryption mechanism went to 

 

this was called

 

rF8v0KRh.php
 
 
We are now certain it was actually removed by the individual who trashed the site.  Given the ludicrous BC price demanded (many time the annual value of the site)  we are becoming more sure that this was a direct attack on the site thinly veiled as a ransomware attack.  
 
rF8v0KRh.php certainly existed for a short time and included a link to borontok.uk with a suitable key for unlocking the BC demand.
 
 
However, after a short time (~15 mins or so) the random page vanished and the site throw a basic forbidden message as you would expect a site with no index file to throw.
 
 
 

Edited by magicker, 25 February 2019 - 01:39 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users