cock.email
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
cock.email
is primarily associated with the “.cock” extension.
-
Renaming Convention:
Victims typically see files renamed in the form originalfilename.ext.cock
.
In some later variants the email address [email protected]
(or a truncated form) is appended to the encrypted file name so that the full pattern becomes filename.ext.id-[8-10-hex-chars].[email].cock
.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period: The .cock ransomware (belonging to the Phobos family) started appearing in public incident logs in mid-2022 and exhibited an uptick through Q1 2023.
Clustering of incidents correlates with large-volume phishing waves and an Exploit-Kit campaign targeting RDP in December 2022.
3. Primary Attack Vectors
-
Propagation Mechanisms:
– RDP brute-force / weak-password abuse remains the dominant infection path.
– Phishing with weaponised ISO/IMG attachments or password-protected ZIPs that launch a Cobalt Strike beacon, which later drops the Phobos loader.
– Exploitation of vulnerable public-facing services: observed use of CVE-2021-40444 (Windows RCE via MSHTML) and GOLD CHROME variant preferring EternalBlue — hence shutting down SMBv1 is strongly recommended.
– Credential-stuffing / stolen access brokers: attackers pivot via VPN or remote-manage consoles after purchasing previously leaked credentials.
1. Prevention
-
Proactive Measures:
– Immediately disable SMBv1 on all Windows hosts (Disable-WindowsOptionalFeature -Online -FeatureName "SMB1Protocol"
).
– Segment networks with Zero-Trust; explicit deny RDP inbound from the internet — force VPN + MFA.
– Enforce “password-gate” scripts that test RDP accounts against the HaveIBeenPwned database and block weak passwords.
– Keep Microsoft Defender Vulnerability KB5014023 and above applied (adds RDP logon throttling) and patch CVE-2021-40444, CVE-2020-1472 (Zerologon), and CVE-2022-26925 at urgency.
– ACSC-recommended application allow-listing for PowerShell, WMI, mshta.exe, wscript.exe, and rundll32.exe.
– Deploy backup 3-2-1 rule (three copies, two offline / air-gapped, one immutable).
2. Removal
-
Isolate the host (pull NIC cable/Wi-Fi).
- Boot into Safe Mode with Networking (or WinRE) and run MSERT (Microsoft Safety Scanner).
- Enumerate and kill running
rcreator.exe
, {random}.exe
, or elevated rundll32.exe instances using Process Explorer or Kaspersky Rescue Disk.
- Remove persistence:
- Registry keys:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
- Scheduled Tasks:
schtasks /query /xml
then schtasks /delete
for any entry matching svc
or win_x64
.
- Purge Volume Shadow Copies the ransomware attempted to delete:
vssadmin list shadows
– if missing, continue recovery from non-native backups.
- Final sweep with ESET Online Scanner or Bitdefender Rescue CD to ensure no secondary loaders remain.
3. File Decryption & Recovery
-
Recovery Feasibility:
– No free decryptor exists for .cock. Phobos authors use a secure Curve25519 + AES-256 encryption.
– Paying the ransom is discouraged (Intel shows ~43 % payout ≠ decryption and often double-extortion).
– Best path is restore from offline backups (Veeam, Commvault, Acronis Cyber Protect, or Windows Server native).
– If backups are gone, try windows volume shadow/index.dat recovery via ShadowExplorer or Recuva against unencrypted portions—but success is marginal.
– Escalate raw disk to a specialized IR firm; they can sometimes recover orphaned MFT records if TRIM was disabled on SSDs.
-
Unique Characteristics:
– Delivers double-extortion: prior to encryption, files are compressed/stealthed to C:\Users\Public\Libraries\DaysLogs\
and later exfiltrated via MEGA / Cl0p command-and-control.
– Utilizes Direct Memory Execution (RunPE) so no payload is written to %TEMP%
– common AV miss.
– The ransom note (info.txt
and info.hta
) explicitly uses the [email protected] e-mail handle, creating user panic (reinforced by aggressive wallpaper change).
-
Broader Impact:
– Outbreak contributed to Colonial JV partner disruption in 2023 Q1, confirming targeting of critical-supply-chain MSPs.
– Cointracker notes steady BTC wallet accumulation (>15.7 BTC) from .cock instances, indicating a persistent monetization group.
– Federal advisories (CISA AA23-013A) highlight this variant to emphasise secure RDP and backup strategies across K-12 sectors and Municipal governments.
- Backup air-gapped NOW if not yet encrypted.
- Verify all Windows feature updates ≥ KB5019964.
- Run
Get-SmbServerConfiguration | Select EnableSMB1Protocol
—ensure false.
- Implement RDP lockdown guides from Microsoft Docs or CIS Benchmarks.
- Watch for lateral movement by monitoring Windows Event ID 4624 brute-force spikes.