Blockchain and Bunny Rabits

Tags:

Tech • Information Technology Economics • Economics

Eps 1: Blockchain and Bunny Rabits

Adventures in Absurdity

Bitpros, CryptoMondays LA & Melrose PR will be co-hosting a record-breaking event for best female attendance at any crypto meetup EVER!
Podcast Recording on Crypto Token Talk, and a chance to win $150 in Bitcoin.
Vericrypt uses machine learning and AI to help identify the emotional content and bias of news.

Seed data: Link 1, Link 2, Link 3, Link 5
Host image: StyleGAN neural net
Content creation: GPT-3.5,

Host

Daisy Shelton

Daisy Shelton

Podcast Content
Cryptico has been demanding for many years that royalties for the commercial use of ciphers for non-commercial purposes be waived and had to file a patent for the algorithm. Rabbit was designed by Peter Pedersen, Andreas Christiansen and Ove O'Hare from the University of Copenhagen, Denmark. The cipher is designed for high performance, with a fully optimized implementation up to 1,000 times more powerful than the world's most popular cipher, the RSA cipher.
This and other research has refuted the claims of WannaCry and NotPetya that BadRabbit is exploiting EternalBlue by SMEs to cross the Wannacry and notPTYa lines. There is no evidence that it used the Eternal blue SMb exploit to traverse, instead it uses an open source cross site scripting attack to open an SMB share. Similar to Not PetyA, it encrypts files with DiskCryptor and demands a ransom in Bitcoin.
Although NotPetya contained a wiper component, BadRabbit interestingly contains the ability of a "wiper," but we have seen no evidence of its use.
The encrypted data appears to be recoverable after payment of the ransom, which means the BadRabbit attack is not as destructive as NotPetya. Bad Rabbit has a number of overlapping elements that we can assume with high certainty that the perpetrators of the attack are the same. They also tried to compose malicious payloads with stolen elements, but the stolen PetyA kernel was replaced.
Given the drama that WannaCry and NotPetya have caused this year, there was a good chance that at some point a new ransomware campaign would emerge.
The answer came in the form of Bad Rabbit, which allegedly used part of the code in NotPetya's variant and comes from a previously unknown ransomware family. Kaspersky says that in order to exploit, victims would have to manually run a malware dropper that pretends to be an Adobe Flash installer. It would also spread through compromised media sites, encouraging visitors to download a malicious Flash update.
Bad Rabbit appears to target organizations in Russia, Ukraine and the USA with attacks that are basically a new and improved NotPetya Ransomware. Ukrainian authorities attribute Bad Rabbit to a threat group they believe is behind not only the attack but also Black Energy. Many security experts believe that Black Energy is acting in the interest and direction of the Russian government.
Bad Rabbit was delivered to argumentiru.com, a website of Russian - related and foreign issues that focus on the security, privacy and security issues of Russia, Ukraine and the United States.
When a user visits an infected website, he or she can download the dripper from the website or from a third-party website. After installing the Flash player player.exe, the drop-down menu appears as a Flash Player installer on the user's computer.
About a week after the first attack, it was revealed that Bad Rabbit was the source of a file encryption bug that has now been fixed. It behaves like traditional Ransomware, executes commands to encrypt files and demands ransom to decrypt them. Instead of the open source software used to fully encrypt the drives, it uses a version of the popular BitTorrent client BitLocker with full encryption.
NotPetya also uses ransomware as a cover for secondary attacks, and investigators believe that the same applies to Bad Rabbit, which went undetected long before the ransomware campaign stopped. It is probably no coincidence that it is also being used in a secondary phishing campaign against a number of Ukrainian companies. This targeted a number of them, which were intended to compromise financial information and other sensitive data.
This allows to start remote services, to try to find other systems nearby, which listen on an SMB connection and then spread the ransomware.
This action is possible because EternalRomance allows attackers to read and write arbitrary data in the kernel memory to spread ransomware. Researchers from Cisco and Talos have evidence that there is a link between NotPetya and Bad Rabbit, and they suggest that the authors of the two ransomware variants may be the same. Microsoft patched the Eternal Romance vulnerability last week, suggesting that those infected by the ransomware outbreak should apply this critical update.
Elastic teamed up with Endgame in October 2019 and migrated all of our blog content to Elastic Cloud, the world's largest open source cloud storage platform.
On October 12, the Ukrainian intelligence service SBU warned of a second wave of cyber attacks on the country's financial institutions and banks. Be on the blockchain, "warned the Swiss Federal Railways in a similar message, pointing out that a" second wave "of attacks is following, in which attackers gain covert, unauthorized privileged access.
Today, the world seems divided into heartless, vindictive, big-mouthed racists looking for an excuse to make snuff videos in their own country and pointing the finger at Asians. When I first heard about the so-called "rabbit cramp fun," I was horrified. The story is about a moon hare from Asian folklore, and it is a mortar that is used to crush dreams and desires sent to him by beautiful shining stars at night.