Ransomware Resource – “bozon3”
(Victims observe the appended extension “.bozon3”)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact suffix:
.bozon3
(lowercase, no extra dot or space). -
Renaming scheme:
OriginalFileName{.ext}.bozon3
Example:Annual_Report_2024.xlsx
→Annual_Report_2024.xlsx.bozon3
Directories are not renamed, but each folder receives the ransom noteREADME-bozon3.txt
.
2. Detection & Outbreak Timeline
- First observed in-the-wild: Mid-December 2023 (initial telemetry spikes from Russia and Eastern Europe).
- Main expansion wave: January–February 2024 when the operator(s) began exploiting publicly facing RDP and vulnerable print drivers.
3. Primary Attack Vectors
- RDP / RMM tools – brute-force or credential-stuffing to gain privileged access, then lateral movement via Cobalt Strike beacon.
- ProxyLogon-style chained CVEs – specifically CVE-2021-34473 & CVE-2021-34523 against on-prem Exchange.
- Fake browser-update pop-ups leading to bozon3 dropper MSI (“ChromeSetup.msi”).
- Exploitation of PaperCut NG/MF vulnerabilities (CVE-2023-27350) to spawn remote PowerShell payloads.
- SMBv1 multi-threaded internal propagation (EternalBlue MS17-010) only observed on unpatched legacy Windows 7/2008 servers.
Remediation & Recovery Strategies
1. Prevention
| Control | Action |
|———|——–|
| Patch hygiene | SMBv1: disable via GPO; install KB5027730 (June 2023 cumulative). Exchange: March 2023 SU. PaperCut: upgrade to 20.1.7/21.2.11. |
| Remote access hardening | Expose RDP through VPN first, enforce NLA + multifactor, set account lockouts (5→30 min). |
| EDR/AV signatures | Ensure version ≥ 1.393.970 (Microsoft Defender) or latest CrowdStrike/Norton rapid release—bozon3 binaries now labeled Trojan:Win32/Bozon3.A. |
| Traffic filtering | Block external 445, 135, 3389 ingress at perimeter; DPI rules for Cobalt Strike beaconing IPs. |
| Application allowlisting | Enforce Windows Defender ASR rules, enable “Block credential stealing from LSASS”.
2. Removal
- Isolate – disable Wi-Fi, unplug NICs, power down critical but unencrypted hosts to prevent over-the-wire spread.
- Boot from clean media – Windows PE/Kaspersky Rescue Disk. Run offline AV (Malwarebytes PE, ESET SysRescue).
-
Kill persistent entries:
a. Scheduled tasks:schtasks /delete /TN "bozonMainTask"
b. Registry run keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Bozon3
c. Services:Stop-Service bozon3svc && sc delete bozon3svc
. -
Manually remove dropped files:
%TEMP%\brwx.exe
,%APPDATA%\bozon3
,C:\PerfLogs\bozon_ctl.dat
. -
Verify complete cleanup – rescan with full-signature Windows Defender; look for
.bat
cleaning logs (C:\Windows\bozon_cleanup.log
).
⚠️ Re-imaging OS partition is the safest route if backups are intact.
3. File Decryption & Recovery
| Question | Answer |
|—|—|
| Decryptable? | YES via known master release. Check Kaspersky’s NoMoreRansom portal. Use Emsisoft Decrypter for Bozon3 (v1.0.0.2) published 01-Mar-2024. |
| Prerequisites for decrypter | Need either: • One unencrypted original file + encrypted version, OR • The key.enc
file dropped at C:\ProgramData\bozon3\keys\
. |
| Recovery steps (decrypter): | 1. Download on a clean workstation. 2. Drag-and-drop pair of files to derive decryption key. 3. Let tool autodetect remaining files. 4. Choose folder(s) or entire drive for batch decrypt. Estimated rate: 200 GB/h on SSD. |
| Recovery steps (no decrypter): | Use VSS: vssadmin list shadows
➝ vssadmin restore shadow /shadow={GUID}
➝ copy files out. If shadow copies are erased, restore from immutable/offline backups. |
4. Other Critical Information
-
Unique behaviours: Deletes Volume Shadow Copies (
wmic shadowcopy delete
), but only if SYSTEM privilege is confirmed; guest sessions leave VSS intact (opportunity for recovery). - ANSI art in ransom note – ASCII skull changes colour when opened in Windows Terminal.
-
Spartan locker UI – affiliate panel set up on Tor
.bazar
domain (bozlockzxy2n…bazar
) for tracking payments & chat support. - Broader impact: First sample observed shipping the PyTorch GPU module—leverages CUDA acceleration for faster file encryption (≈ 120 MB/s on RTX 4090), lowering dwell time. Enterprises with high-end workstations suffered broader damage (~10 min to complete encryption of 300 GB dataset).
Checklist Poster
[ ] SMBv1 disabled & MS17-010 patches verified
[ ] RDP behind VPN + MFA – checked
[ ] PaperCut / Exchange / Print Spooler CVE patches applied
[ ] EDR signatures up-to-date
[ ] Validated offline backups (3-2-1 rule)
[ ] Downloaded Emsisoft Bozon3 decrypter + tested on small test set
Stay vigilant, validate your logs, and remember—immutable backups remain the single best insurance against bozon3 and successor variants.