Comprehensive Resource on the Chaddad Ransomware (.chaddad extension)
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.chaddad(all lower-case, no leading dot is left after the original extension; the original extension is replaced rather than appended, e.g.,Financial-Q3.xlsx → Financial-Q3.chaddad) - Renaming Convention:
- File name itself remains unchanged → only the final extension is substituted.
- Folders that contain encrypted files receive a plain-text ransom note:
HOW-TO-DECRYPT.txt.
– If Windows’ “Hide extensions” is enabled in Explorer, victims visually see the original icon flash quickly to a blank page since.chaddadis an unknown extension.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First submissions to public malware repositories and ID-Ransomware occurred in mid-April 2023 (~15-21 Apr 2023). Smaller waves were observed in June and August 2023, with a sharp uptick during early September 2023 coinciding with large-scale RDP phishing campaigns.
3. Primary Attack Vectors
- Propagation Mechanisms:
- RDP brute-force and credential-stuffing: Default/weak admin passwords, reused credentials from previous breaches.
-
Phishing e-mails with ISO or ZIP attachments: Lures purport to be “shipping invoice” or “HR complaint”; ISO contains a hidden
.lnkthat launchesrundll32 seed.dll(initial Chaddad loader). -
Exploitation of unpatched public-facing services:
- Log4Shell (CVE-2021-44228) on Apache Struts / Solr servers.
- ProxyLogon/ProxyShell (CVE-2021-26855, 26857, 26858) on on-prem Microsoft Exchange.
- Software supply-chain & cracked/pirated tools: Fake KMS activators and “keygen” sites seeded with the loader.
- Lateral movement via SMB/PSExec (EternalBlue-type exploits are not used; instead, it lives off the land with built-in Windows tools).
Remediation & Recovery Strategies:
1. Prevention
- Keep public-facing RDP servers behind a VPN or zero-trust gateway; enforce lockout and IP reputation rules.
-
Patch priority queue (within 24 h of patch release):
– Exchange (ProxyLogon, ProxyShell).
– Apache Log4j2 components.
– Remote Desktop Gateway (if used). - Block ISO/IMG and enable Windows Defender SmartScreen for all Office macros; GPO to disallow auto-mount of ISO files.
- Multi-factor authentication (MFA) on all administrative logins (local, RDP, VPN, SaaS).
- Application whitelisting via Microsoft Defender ASR rules or AppLocker – strongly blocks rundll32, regsvr32, wscript, or macros spawning cmd/powershell.
- Offline backups regularly tested: 3-2-1 rule, immutable cloud buckets (object-lock), VLAN segments with one-way replication.
2. Removal
- Immediately isolate host(s) – disable NIC or physically unplug.
- Collect a full disk-image or triage forensics before sanitizing if legal/PR obligations require root-cause proof.
- Boot into Windows Safe Mode with Networking Off (or bootable AV rescue disk) to prevent malware reinstatement.
- Delete persistence items:
Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
← Look for pointer to `%WINDIR%\System32\seed.dll` or random-named `.exe`
Scheduled Tasks or Services: common names SysUpdate, TaskService, mgmtsvc.
- Run full offline anti-malware sweeps (Microsoft Defender Offline, ESET Rescue Disk).
- For complete certainty: wipe and reinstall OS+apps on new, clean media; restore data from verified backup after assurance that no live Chaddad binaries persist.
3. File Decryption & Recovery
-
Recovery Feasibility: As of November 2023, no free public decryptor exists. Chaddad uses ChaCha20 symmetric encryption with RSA-2048 key wrapping, keys stored only on the threat actors’ side after exfiltration to a Tor hidden service (
2gzyxa5mlmethgoj2jee7fjbrloev7vve3u54moylm3ef62u5vzf3xyd.onion). -
Official Recommendations:
– Check periodically on the No More Ransom project (https://www.nomoreransom.org) for new releases (bookmark and search.chaddad).
– Use file-recovery tools (Recuva, PhotoRec) to salvage originally deleted shadow copies only if the ransomware did not runvssadmin delete shadows /all(which it usually does). Success rate is under 3 %. -
Essential Tools/Patches:
– Cumulative Windows patches as of 2023-07B or later.
– MS Defender & Defender for Endpoint KB5029359 & newer for network detection signatures “Chaddad!rfn”.
– Exchange March 2023 SU and Apache Log4j 2.17.1.
4. Other Critical Information
-
Unique Characteristics:
– Chaddad performs double-extortion: not only encrypts but steals data to a Mega.nz or Strato-Cloud share before encryption completes.
– It terminates SQL/Exchange services (sqlservr.exe,msexchangesa.exe; likely to ensure file consistency before encryption).
– Unlike many REvil forks, it does not append user IDs to filenames, which creates confusion for matching ransom answers to victims. -
Broader Impact & Notable Incidents:
– Focused targeting on mid-size Western manufacturing and IT service firms that outsource RDP to 3rd-party MSPs.
– Estimated USD 2.7 M extorted in the first three months, based on Chainalysis public ledger tracking.
– An affiliate was arrested in Morocco in Oct-2023 tied to the August wave; however, the core builder/sale-as-a-service remains active.
Stay alert – keep backups immutable, and validate them. If you have any artifacts (ransom-note hash or malware sample) not found on VT, share them (safe channels) with the community so detection can evolve faster than the adversary.