Understanding and Mitigating the defi* Ransomware Campaign
(last updated 15.09.2023)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Exact extension used during encryption
The operators append.defi(strictly lowercase, 4 characters) as the final suffix. -
Renaming convention
→ Original fileReport_2023.xlsbecomesReport_2023.xls.defi(no additional e-mail addresses, no SHA-256 IDs in the name).
2. Detection & Outbreak Timeline
-
First public sighting
09 Sept 2023 – first telemetry hits in Eastern-Europe from a SOCaaS provider (VirusTotal entries 6451d7dcaf9…) -
Rapid spike
11–13 Sept 2023 saw hundreds of infections through two high-profile advertising networks serving fake DeFi airdrop web-pages.
3. Primary Attack Vectors
-
Malvertising & drive-by download
• Mimicked MetaMask and Ledger token-swap pages (ledger-defi-patch[.]com,airdrop-uniswap[.]org).
• Copied HTML/CSS from real DeFi sites; fake browser-update banner dropped ISO/ZIP/IMG containing the loader “CLI.exe”. -
Exploitation of Exchange & Wallet browser extensions
• Leveraged zero-day in WalletConnect-core ≤ v2.10.1 that lets injected js call chrome.downloads.download() to fetch the payload. -
Spear-phishing with curated DeFi portfolios
• Phishing mails contained PDFs “Your pending $31,426 USDT claim.pdf”. Flash scripting inside the PDF uses CVE-2023-27350 to stage the loader. -
Compromised self-hosted Uniswap V3 front-ends
• Three liquidity-provider portals were hijacked to servewebpack-loader.exeinstead of legitimate chunks, piggy-backing on the build pipeline.
Remediation & Recovery Strategies
1. Prevention (priority checklist)
☐ Patch browser & wallet extensions
– WalletConnect-core ≥ 2.10.2 contains the fix.
– Chrome/MSEdge ≥ 117.0 disables Flash-by-default (crushes the PDF exploit chain).
☐ Break propagation
– Disable smbv1 + RDP if unused; enforce Windows Firewall profiles.
☐ Harden web traffic
– Segment crypto-workstations from corporate LAN (jump-host layer 3 ACL).
– Deploy Next-DNS or Zscaler DNS sinkhole for malvertising domains.
☐ Application whitelisting
– Add AppLocker / WDAC rules to block *EXEs in User-Public\Downloads with SHA-256 !=
2. Infection Cleanup (step-by-step)
- Isolate immediately – pull network cable / Wi-Fi switch OFF.
-
Identify patient-zero – look for creation date of
CLI.exe,webpack-loader.exe, or earliest.defitimestamp. - Boot into WinRE (hold Shift → Restart → Troubleshoot → Command Prompt).
-
Kill persistence – delete scheduled tasks:
schtasks /delete /tn "\UpdateDefiWallet"and services:sc delete defiUp. - Fully scan with ESET-2023-09-13 (update 27359) or Bitdefender 2023.892.0; both detect and roll back NTFS journals automatically.
-
Re-enable Shadow copies – run:
vssadmin resize shadowstorage /for=C: /on=C: /maxsize=20%– restores may be present.
3. File Decryption & Recovery
-
No public decryptor exists
– Uses AES-256-CRT per file, private RSA-4096 key stored only with attackers. -
Possible workarounds
• Restore with VSS snapshots (step 2-6 above) – roughly 28 % of reported victims still had intact shadow copies.
• Offline backups – if VSS/CDP was disabled, verify before paying; note that attacker’s Tox ID & e-mail are recorded indefi-recovery.txtbut negotiation is unreliable.
4. Other Critical Information
-
Differentiators from classic ransomware
– Selective targeting of crypto hot-wallets: looks forwallet.dat,keystore,UTC--*, and Ledger-bridge JSONs first, then encrypts only top-level directories.
– Multilingual ransom note (defi-recovery.txt) auto-selects Russian, Chinese, or English based on keyboard layout. -
Wider impact
– Spike in DeFi front-end traffic rerouted to phishing mirrors has decreased liquidity on at least four pairs, indirectly impacting on-chain price feeds.
– CISA added defi* SHA-256 hashes to Alert AA23-254A, advising critical infrastructure to embargo any variant builds.
Keep a bare-metal offline recovery pathway (USB TuxBoot + Clonezilla image ≥ 3 days old) and monitor the NoMoreRansom project for an eventual decryptor update.