The Ransomware Doctor Without a CureDecember 2, 2018
When it comes to ransomware attacks, there is nothing a company hates more than paying the demanded ransom. It is an unexpected fine often caused by a tiny, yet crucial mistake – an unpatched device, an out-of-date product or an innocent human error. It may harm the reputation of the security department, but most of all, it’s the idea of paying a significant, though unnecessary, amount of money to a malicious actor. And even then, there is no guarantee the files will actually be recovered. Accordingly, national agencies advise against paying the ransom under any circumstances.
So, once infected, there are essentially three options available to the victim:
- Pay the ransom to the threat actor responsible for locking those files in the first place.
- Find if a key is publicly available for the particular strand of malware and use it to unlock the files.
- Pay someone who claims to be able to unlock the files without paying the ransom.
For those who refuse to be extorted by such ransomware attacks, which is the advice the IT security industry recommends, and if no public key is available, the third option above certainly appeals. And it is here that Check Point Research has discovered a unique and worrying new development in the Ransomware landscape.
Usually IT services that aim to help ransomware victims will explain they can only try and do their best, with no promises made. However, a recently spawned cottage industry rides on the back of ransomware infections by offering desperate victims a way to avoid paying the ransom payment and guarantees to unlock their files for even ransomware that has no public key available – now that’s quite a promise!
When our team came across a certain service that was making this exact claim, vowing to perform dazzling feats of cyber wizardry to unlock files held captive by the Dharma/Crisis ransomware (for which no decryption key is available), they couldn’t help but think something was off, especially when that was the only service that this ‘IT consultancy’ offers.
After a fascinating investigation, Check Point Research reveals below how a Russian company, named ‘Dr. Shifro’, claims to legitimately provide file decryption services to ransomware victims, though in fact merely pays the ransomware’s author themselves and passes on the cost to the victim – at a massive profit margin.
Furthermore, not only did we uncover the relations and workflow between the Dharma ransomware operators and Dr. Shifro, including the demanded ransom and mediator’s profits, but also the possible person behind Dr. Shifro, his whereabouts and his estimated profits.
The Dharma Ransomware
The Crisis ransomware family, also known as Dharma, was first observed in 2016, distributed mainly by spam emails but also via manually hacked RDP access. Upon launch, the malware sets up persistence on a victim’s operating system and starts encrypting files with specific extensions that are embedded in the configuration of the ransomware. Fixed, removable and network drives are also affected and, depending on the exact version of the ransomware, some extensions to the name of an encrypted file are added (for example: .dharma, .wallet, .arena, .cobra, .java, .brrr). After the encryption process is finished Dharma then displays a ransom note which provides instructions and two e-mail addresses to contact to obtain the decryption tool.
Figure 1: Crisis ransom note.
In autumn 2018, however, we noticed this malware family was still active with new versions that append extensions .arrow, .bip, .gamma, .brrr and others. A quick review of Dharma references on online forums shows that the ransomware is in demand.
Figure 2: A request to join the Dharma ransomware campaign, as posted on the Dark Web.
Figure 3: A Dharma ransomware partnership advertisement (October 18, 2018).
Translation: Affiliate recruitment. We don’t work in Russian Federation and CIS. My fee is $400 per decryption. Contact details for builds and support email@example.com
No Public Decryption Tool Available for the New Dharma variant
After researching several samples to ensure that the encryption algorithms did not contain any vulnerabilities, we found that in order to encrypt a victim’s files, the ransomware implements the AES-256 algorithm and an AES key is encrypted with RSA-1024 and stored within the extra data chunk which is appended to each encrypted file.
For RSA encryption a public key embedded into the malware’s binary is also used. In addition, the researched samples contained different RSA public keys that are not present in the list of previously released master keys. As a result, files encrypted with a new version of the ransomware cannot be decrypted with any of the publicly available decryption tools.
However, a Russian company named ‘Dr. Shifro’, claims to indeed be able to decrypt files encrypted by any new version of the Crisis/Dharma ransomware.
Dr. Shifro to the Rescue…
Opening business in 2016, coincidentally the same time that the first Crisis/Dharma ransomware campaigns began, ‘Dr.Shifro’ claims on its website to be “the only company specializing in data decryption after ransomware attacks”. Other than Dharma, ransomware families covered by the service according to the website include Scarab, No_More_Ransom and Da Vinci.
Figure 4: The whois data for the ‘dr-shifro.ru’ domain name.
According to the information published on the Dr. Shifro website, the company claims to help victims with the decryption of “1C” databases and Microsoft Office documents.
Figure 5: Dr. Shifro decryption services advertisements as seen on the Dr. Shifro website.
Translation: Decryption of 1C databases. “1C:accounting” encrypted and doesn’t run and quarterly reporting begins. Call us, we’ll help! [Read more]
Decryption of office documents. Regular icons of Word, Excel, Pdf documents have changed to something weird and don’t open? Here is a solution! [Read more]
Another claim on the website says that in the vast majority of cases. Dr. Shifro exploits vulnerabilities in encryption algorithms of ransomware that allows them to restore RSA private keys.
Figure 6: Dr. Shifro advertisement message.
Translation: Dr. SHIFRO company engages in professional data recovery. Our experts have found a vulnerability in the algorithm of malware operators that appeared to be flawless, which allows us to restore a private key that has been used for encryption of users’ files in 99% of cases.
However, as mentioned above, in case of Dharma ransomware an RSA public key is embedded into each sample and not generated at the victim’s end. Therefore, the message above (Figure 5) could only mean that Dr. Shifro is able to break RSA-1024. Highly doubtful this is indeed the case, we began wondering – Could it be possible that Dr. Shifro is receiving its customers’ recovered files from the only actor with access to the RSA keys – the ransomware operators?
That would mean that Dr. Shifro has been misleading the Dharma ransomware victims by posing as a legitimate company, when in reality, it merely functions as a broker between the attackers and their victims to maximize the operation’s profits.
Our Investigation Begins
In order to understand Dr. Shifro’s ‘decryption process’, we managed to get hold of one of their customer’s correspondence with them. In this customer’s case, they had been infected with a recent .gamma version of Dharma with an RSA key absent in the list of published master keys. After the customer had contacted Dr.Shifro and sent them some of their encrypted files via the email published on the company’s website (firstname.lastname@example.org), a Dr. Shifro representative had responded instantly (within 2 hours) and returned the files decrypted.
Figure 7: Dr. Shifro’s response to a victim of the Dharma ransomware
We managed to decrypt your files. Cost of the decryption tool is 300 000 rubles + visit by specialist 5000 rubles (the cost is for Moscow region).
Operating procedure is the following:
1. Our specialist visits you at home or at office. We sign the contract in which we fix the cost of services.
2. Run the decryption tool and decrypting all the files.
3. You unsure that all files opened. Then we sign statements of acceptance/delivery.
4. You pay only in case of successful decryption.
Also remote work is possible with payment under contract.
We guarantee the decryption of all files.
An example of the decrypted file is in the attachment.
Such a quick response time could only mean that either Dr. Shifro has RSA private keys for this infection case or he instantly interacts with the ransomware’s operator to receive them.
To know Dr. Shifro’s process for sure, there was only one way to find out. We would need to carry out our own investigation. And as we had assumed the organization acts as merely a broker, we would need to control both sides of the attack chain – the ransomware operator and the ransomware victim.
Figure 8: Check Point infiltration scheme
Setting Up the Investigation
Before setting our plan into action, and in order to correspond with Dr. Shifro as both the ‘Ransomware Victim’ and the ‘Ransomware Operator’, we would first need to register email addresses:
- email@example.com – Fake Ransomware Operator
- firstname.lastname@example.org – Fake malware operator (additional email)
- email@example.com – Fake Victim
We then encrypted several files with a newly-created RSA-1024 public key, using the algorithm ripped from the ransomware. The names of the encrypted files also contained the email of the fake Ransomware Operator.
Figure 9: Files encrypted with the newly-created RSA key.
Following this, we then sent a message to Dr. Shifro using his website’s email, (firstname.lastname@example.org) on behalf of the fake ‘Ransomware victim’. Our email explained how we had recently become a ransomware victim and were looking for help with decrypting our files:
Figure 10: Our initial message to Dr. Shifro on behalf of the fake ransomware victim.
Translation: Looking for help with decryption of encrypted files. Today a part of our PCs in accounting department was infected with ransomware. We tried to use decryption tool from Kaspersky’s website, but it didn’t help us. We are not going to pay a ransom to unknown person… Please reply as soon as possible.
After a few minutes we received a reply from Dr. Shifro in which we were asked to send several encrypted files as a sample in order to determine the level of difficulty to decrypt them and the subsequent price to do so. He also cautioned us against using the services of other companies in the meantime.
Figure 11: The Dr.Shifro’s reply to the fake ‘Ransomware Victim’.
Translation: Send us several samples of encrypted files: doc, docx, odt, txt, rtf which size is less than 100Kb or pdf, jpg, png, bmp which size is less than 3Mb.
After analyzing the files we will be able to estimate the cost of our service.
We then replied with the attached files we had ourselves previously encrypted:
Figure 12: The message to “Dr.Shifro” with the encrypted files attached.
After this response Dr. Shifro went silent for two days. Of course, they were unable to decrypt files instantly because they did not have the RSA private key. In addition, the long delay could well have been due to them needing time to contact the various ransomware operators with which they have partnerships and try to obtain the relevant decryption key for this new customer.
On October 20, however, we received the following message into our fake ‘Ransomware Operator’ inbox. It was from email address “email@example.com”:
Figure 13: The message to fake ransomware operator from a person behind “Dr.Shifro”.
We should emphasize here that the email address of the fake ransomware operator, “firstname.lastname@example.org” was known only to us and Dr.Shifro. Therefore the address “email@example.com” definitely belonged to the individual behind Dr.Shifro.
In response to Dr. Shifro’s email, and posing as the fake ‘Ransomware Operator’, we replied with the decrypted version of the files that we had received attached and the ransom amount and bitcoin address to where payment should be made.
Figure 14: Our reply on behalf of ransomware operator.
Following this initial correspondence we then received a reply from Dr. Shifro, again from email firstname.lastname@example.org, in which they revealed how their business model works.
He explained that he is a mediator and regularly redeems keys for clients, sending bitcoin without any questions. He then asked for a discount on the 0.2 BTC we had requested to 0.15 BTC for the key. At this point we stopped communication.
Figure 15: Response of the person behind Dr. Shifro to the fake ‘Ransomware Operator’.
Translation: I’m an intermediary. We redeem keys for clients since 2015 on a regular basis. Send bitcoins tight, don’t ask dumb questions.
Clients frequently addressed under recommendation. Could you give a discount to 0.15 btc?
To understand the exact profit margin added by Dr.Shifro to the initial ransom price, this time posing as the fake victim we then contacted them again to ask for a status update.
Figure 16: The fake ‘Ransomware Victim’s request for a status update.
We finally received a response from Dr. Shifro in which they informed us, the victim, that the files were successfully decrypted (a sample was attached) and that the price was 150,000 Russian Rubles (approx. $2300).
Figure 17: Response from “Dr.Shifro” to the victim.
Translation: We managed to decrypt your files. Cost of the decryption tool is 150 000 rubles + visit by specialist 5000 rubles (the cost is for Moscow region)…
Dr. Shifro requested to pay us, the ‘ransomware distributors’, 0.15 btc, the equivalent of approximately $950 at the time, and charged the ransomware victim 150,000 rubles, worth approximately $2300. This means the company would earn around $1350 from a single victim.
Threat Actor Doxing
As mentioned above, our fake ‘Ransomware Operator’ received messages from the email address, email@example.com. Crossing multiple sources, we managed to determine that iharauch is a unique user’s avatar. Using this identifier a profile at localbitcoins.com platform was easily found:
Figure 18: iharauch profile at localbitcoins.com.
The trading volume on this account, which signifies the amount of BTC purchased by our actor, enables us to estimate the amount of decryption keys Dr. Shifro bought since 2016, and the profit he gained as an intermediary between victims and ransomware operators.
The average BTC value for the examined time was $3000, and the trading volume of Dr. Shifro’s account is at least 100 BTC – which means that the actor spend at least $300,000 on key purchase. Our investigation revealed that Dr. Shifro pays approximately $950 for each key – which means that the actor made at least 315 deals. Taking into account that Dr. Shifro could have earned $1350 in net profit from the deal we allegedly initiated, we can estimate that the business yielded at least $425,000. The profits could grow even higher if the same decryption keys have been used several times and Dr. Shifro could have sold a single key move than once.
Noting the various several thank-you letters published at the dr-shifro.ru web-site, we decided to take a closer look to see if we could garner any further information about Dr. Shifro. One such letter actually contains the supposed name of the person behind the Dr.Shifro Company – Mr. Igor Ovcharenko.
Figure 19: Thank-you letter published at dr-shifro.ru.
Translation: “Gelendzhik seaport” Closed Joint Stock Company thanked Dr. SHIFRO Company for professionalism, commitment and rapid response to our requests.
We are particularly grateful to your employee Ovcharenko Igor Nikolaevich for fruitful cooperation, responsibility, professionalism and goodwill.
Using the “iharauch” identifier, an acknowledgment of a relation between the name and the “iharauch” avatar could be found:
Figure 20: The connection between the avatar and the name “Igor”.
Translation: [I] would like to buy or exchange with a surcharge a 16 GB [iPhone] (French, sim-free, 4.2.1). Call 89165581253 Igor.
Figure 21: The location of the person is Moscow.
Figure 22: “iharauch” profile https://vk.com/id3556491
Despite the fact that the VK.com social network profile of “iharauch” has not been updated since 2014, we were able to find other active profiles connect to the VK.com profile.
In order to obtain information about the legal status of the Dr.Shifro organization, we asked them, using our fake victim address, to send us a template of the contract which is usually signed before Dr. Shifro starts work on decrypting files. The response we received contained a template of a civil contract and a handful of personal registration documents of the person behind Dr.Shifro, including scans of his passport, registration of residence, insurance certificate and Internal Revenue Service certificate.
The civil contract contains personal data of a certain ‘Ovcharenko Igor Nikolaevich’ including passport details, taxpayer identification number and even personal bank credentials. The contract suggests the commitment to decrypt up to 1000GB of data using “one code” by the service contractor. In turn, the customer also commits to make payment of 150,000 Russian Rubles.
Figure 23: Dr.Shifro’s civil contract template.
Mr. Igor Ovcharenko runs a simple, organized and profitable business. As Dr. Shifro, he reaches out to customers in need of his help, victims hit by the ransomware families including Dharma, Scarab, No_More_Ransom and Da Vinci, for which no key is publicly available. He doesn’t operate under the radar though. Instead he maintains contact with his clients and partners throughout the process and binds his service with a civil contract. Furthermore, he even provides his personal credentials as part of the deal closure. This all enables Dr. Shifro to act as a legitimate business, though in reality Dr. Shifro’s services rely on its malice collaborators, ransomware distributors themselves.
Our case study, in which we formed direct contact with Dr. Shifro as both a ransomware distributor and victim, taught us that the company earns, on average, $1350 per customer, and over $200,000 per year. It is an efficient and easy-to-run business model that can significantly increase the profits generated by ransomware campaigns. Therefore, we may expect to see other threat actors running similar operations. Considering the recent decreasing popularity of ransomware in favor of cryptomining malware, the new and rising industry could enlarge the profits from ransomware attack campaigns and put this malware type back at the top of the charts.