RIG-E Exploit Kit now distributing New CHIP Ransomware
Brad Duncan, a security researcher for Rackspace, is well known for monitoring exploit kit activity and the payloads that are being distributed by them. In an article posted yesterday, Brad shows how the RIG-E (Empire) exploit kit has started to distribute a new ransomware called CHIP.
When a visitor browses to a site compromised with the RIG-E exploit kit, the injected script will try and exploit vulnerabilities in the visitors installed programs. If the kit can exploit a vulnerability it will download and install the payload, which in this case is the CHIP ransomware. This chain of events can be seen from in an image below from Brad’s article.
According to a post on the BleepingComputer forums, each victim will download their own unique RSA-512 key from the ransomware’s command & control servers. This key will then be used to encrypt the AES encryption key used to encrypt the actual files. When a file is encrypted it will have the .CHIP extension appended to the file name. For example, when test.jpg is encrypted it would be renamed as test.jpg.chip.
When the ransomware is done encrypting the files it will display a ransom note called CHIP_FILES.txt, which contains information such as the victim’s unique ID and instructions on connecting to the TOR Payment site for this ransomware.
When the victim goes to the TOR payment site they will be prompted to leave enter their ID and a message in order to receive payment instructions.
At this time it is unknown how much they are asking for the ransom. As the victims are using unique RSA-512 encryption keys, though, it becomes highly unlikely to be able to decrypt this for free.