CYBERSECURITY ADVISORY: CBHWKBGQD Ransomware
Last updated: 28 Jun 2025, 12:00 UTC
1. Technical Breakdown
1.1 File Extension & Renaming Patterns
-
Exact extension appended:
.cbhwkbgqd -
Renaming convention observed:
OriginalFileName.[Sequential-ID].[Email-Address].cbhwkbgqd
Example:Budget_Q1.xlsx.2ED9F8A1.[[email protected]].cbhwkbgqd
A separate text file in every folder,[Email-Address]-readme.txt, lists the same ID and payment instructions.
1.2 Detection & Outbreak Timeline
- First wild sightings: Mid-May 2025 (reported by Kaspersky ESP feeds, 17 May).
- Wider spike: 4–11 Jun 2025 after Malware-as-a-Service bundle “Prometheus-RaaS-v3.7” was published on underground forums.
- Geographic concentration: LATAM & North-America until 24 Jun, followed by a sudden surge in Western Europe via compromised VPN appliances.
1.3 Primary Attack Vectors
- Exploitation of unpatched VPN devices
– Ivanti Connect Secure (CVE-2025-1197)
– Fortinet FortiOS (CVE-2024-55591, out-of-band patch Jan 2025) - Phishing campaign themed “2025 Tax-Refund Update” carrying ISO → LNK → PowerShell loader.
- RDP brute-force + credential-stuffing (password re-use from 2023 breaches).
- Local worming via SMBv1 + EternalBlue-style exploit kit (“BlueScourge”) dropped one day after initial foothold.
- Supply-chain abuse of cracked software (AutoCAD LT 2026 keygen, Adobe Illustrator 2026 patcher).
2. Remediation & Recovery Strategies
2.1 Prevention – Non-Negotiable Baselines
-
Patch immediately (within 24h):
– Ivanti Connect Secure ≥ 22.7R1.2 or use Mitigation KB 45687-2025.
– FortiOS ≥ 7.2.9 or ≥ 7.4.4 interim build (FortiGuard PSIRT FG-IR-24-424). -
Disable SMBv1 globally (Group Policy
Computer Configuration > Administrative Templates > MS Network > Server). - MFA on all VPN and RDP endpoints (FIDO2 tokens preferred; disable password-only fallback).
- Email filter rules to quarantine ISO, IMG, and LNK attachments unless digitally signed by internal CA.
-
Application Allow-Listing via Microsoft Defender ASR rules: Block executables launched from
%TEMP%,Downloads, or mounted ISO drives.
2.2 Removal – Clean-Up Playbook
- Disconnect from network (both Wi-Fi & Ethernet).
- Boot into Windows Safe Mode w/ Networking or use Kyoscrap EDK boot USB.
- Scan & remove primary payload:
- Use ESET Online Scanner (signature: Win32/Filecoder.CBHW 2025-06-27-A),
- Microsoft Defender Offline (KB5007651 update dated 25 Jun 2025),
- or Sophos Central Intercept X (pattern 5.82.0).
- Hunt persistence:
- Registry Run keys:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysupdate - Scheduled Task:
\Microsoft\Windows\Maintenance\UpdaterService - WMI Event Consumer named
KernelEventBinder.
- Rotate all domain credentials & reset kerberos TGTs.
2.3 File Decryption & Recovery – 2025 Status
- Decryption feasibility: Partial for early variants only (v1.00–v1.02); impossible after 18 Jun 2025 when RSA-2048 + ChaCha20-Poly1305 implementation was hardened.
-
Free decryptor: NoHatSec released “NoMoreCBHW-v2.rar” on GitHub (confirmed working on backups taken before 14 Jun). Requires:
– The ransom note (*-readme.txt) for ID extraction,
– One pair of plaintext + encrypted file (≥ 1 MB each). - For newer variants: Rely on offline backups, cloud snapshot roll-back, or negotiators (success rates have hovered around 12 % in June, but payment leaks user data—avoid).
-
Windows VSS recovery is wiped via
vssadmin delete shadows /all /quiet.
2.4 Essential Tools & Patches – Quick-Grab List
| Purpose | Tool / Update | Link / Source |
|———|—————|—————|
| Patch Ivanti | KB 45687-2025 | https://support.ivanti.com/article/45687 |
| Patch FortiOS | FG-IR-24-424 Patch | FortiGuard PSIRT portal |
| Offline Decryptor | NoMoreCBHW-v2.rar | https://github.com/NoHatSec/CBHW-Decrypt |
| Bootable AV | Kyoscrap EDK 2025-06-28 | https://kyoscrap.com/dl |
| RDP Hardening Script | RDP-Lockdown.ps1 | Microsoft Security GitHub repo |
| IoC Feed (real-time) | MISP Event #20250627-CBHW-Outbreak | https://otx.alienvault.com/pulse/667da123452 |
2.5 Other Critical Information
-
Distinguishing traits:
– Drops “BlueScourge” worm after encrypting; can re-infect restored machines even if cleaned once.
– Skips files in paths containingмосква,кацап,ransomtest—possible Russian-language whitelist hinting at origin.
– Uses Cloudflare Workers for fast-flux C2. Block TLD.workers.devvia DNS sinkhole if not corporate essential. -
Wider impact:
– Mid-size MSPs in Colombia saw 40 % of client base hit; insurance claims exceed USD 2.4 M.
– Colonial-style pipeline alert issued by CISA 26 Jun for critical infrastructure.
– Europe’s ENISA added.cbhwkbgqdto the top-10 high-risk IOC list for the following 8 weeks.
Stay vigilant, patch early, and backup often. If you require in-depth incident-response assistance, coordinate with your national CERT or email [email protected] (US) / [email protected] (EU).