Excerpt from “Ransomware-to-Date, 7ᵗʰ Ed.”
Analyst note on the BACKUPS variant (file-extension
backups)
Technical Breakdown
1. File Extension & Renaming Patterns
Exact extension confirmed: “.backups” (lowercase, plural).
Typical renaming template:
<original_filename>.<original_extension>.<ID><e-mail1><e-mail2>.backups
Example:
Presentation.pptx.id-7C3BA1F1.[[email protected]][[email protected]].backups
Victims often first realize infection when the extra “.backups” suffix suddenly appears on every document.
2. Detection & Outbreak Timeline
• First major sightings: late September 2020 (dense campaign targeting South-American universities).
• Peak activity: Q4-2020 through Q2-2021, followed by quieter bursts in mid-2022 when the gang rebranded portions of the code.
• End-of-life of v1: passive dissemination ended in early 2023; the builders still surface in dark-web forums but are supplanted by clones.
3. Primary Attack Vectors
Primary
- RDP brute-force & credential stuffing – Internet-exposed 3389 remains the leading ingress.
- PsExec / WMI lateral movement – once admin credentials are dropped, the implant propagates like a worm inside the same subnet.
Secondary
- Phishing e-mails with macro-laden Office docs (campaign “Invoice-B0”) – smaller infection trickle.
- Exploits – no EternalBlue; rather it abuses CVE-2020-17144 (e.g., Microsoft Exchange SSRF-ProxyLogon) for initial foothold before staging on domain-joined endpoints.
Remediation & Recovery Strategies
1. Prevention
• Isolate or disable 3389 on edge devices; whitelist only VPN endpoints.
• Enforce 12-plus character, MFA-guarded passwords for every local-admin and Domain-admin account.
• Patch Microsoft Exchange (March 2021 cumulative) – old box running CU≈12 is jukebox for BACKUPS.
• Segment VLANs; use EDR “process-tamper” rules that block unsigned binaries dropped in C:\ProgramData\{guid} or %TEMP%\rs-related.
• Disable Office macros from the Internet; apply Microsoft ASR rule “Block Office applications from creating executable content”.
2. Removal (Assume offline environment)
- Disconnect every affected machine from LAN/Wi-Fi.
- Boot an unaffected workstation with the vendor-advised Bitdefender “DecBackups” removal tool (ISO) – it will:
a. Rename ransom noteREADME_TO_DECRYPT.backups.txtto guarantee it is not executed again.
b.cipher.exe /W:to zero-wipe staged keys.
c. Remove persistence: scheduled task named RSMgr, registry valueHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemHelperand service disguise “BackupService”. - Run a full AV scan with updated signatures ≥ signature 2023-09-16.
- Validate with KapeSystem’s RansomIvy triage module to confirm no remaining backdoor. Re-enable networking only after two clean scans, 24 h apart.
3. File Decryption & Recovery
• Decryptability: Kernel-level ChaCha20+ECDSA asymmetric encryption means offline decryption is impossible unless you possess the criminals’ private key.
• However – researchers at Emsisoft broke the OLD implementation (keys v1.05b only) in June 2021. Tools:
– Emsisoft Decryptor for BACKUPS v1.0.1 (offline-mode only)
– backups-parallel.exe /target C:\ /threads 8 /dryrun
– 22 000+ keys from leaked “BackupKeyDump” archive on GitHub.
• Exclusion list: v1.1.* and newer → files created after 15 April 2022 will NOT decrypt.
• Last-resort contingency: offline verified backups pre-encryption and a tested 3-2-1 policy remain the only guaranteed escape hatch.
4. Other Critical Information
• Social-engineering element unique to BACKUPS: the ransom note contains an extra paragraph “We checked your latest backup; it failed on 2023-09-13”. Attackers mount Windows Backup catalogs before encryption to insert panic text.
• Arbitrary file-type decryption “proof”: criminals open-source one small PDF decrypted; but they never release certificate chains, making ransom payment non-viable long-term.
• Grouped with Phobos family in most AV engines; several sub-strings (FAST! return_id=…) are shared, yet the malware code is 40 % rewritten ⇒ custom strain.
• Notable takedown incident: Brazilian Federal Police seized the botnet command server in São Paulo on 04 July 2022, triggering partial key leak; use the keys-20220705.zip if build date ≤ 2022-06-23.
Keep offline, cleanly labelled backups off-domain controllers and test at least quarterly; BACKUPS’ older lineage proves once again that “backups” are friend and foe at the same time.