Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Files hit by “Duck” ransomware acquire the extra suffix “.duck” (e.g.,
Report.xlsx → Report.xlsx.duck). -
Renaming Convention: The malware only appends the new extension; it does not scramble the original file name, path, or drive letter—helping you quickly identify the scope via a simple
dir *.duck /scommand.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: Duck first surfaced in early-December 2019 when victims uploaded samples to ID-Ransomware and VirusTotal. It is a Philis (a.k.a. FMCrypt) re-brand—a family that has been circulating in various skins since mid-2018.
3. Primary Attack Vectors
-
Propagation Mechanisms:
– RDP brute-force & credential stuffing – attack buys/breaches low-level creds, brute-forces 3389/33891, manually drops the exe.
– Pirated/boot-leg software bundles – fake “Crack”, “Keygen”, or “Windows activator” that dropsDuck.exealongside the promised ware.
– SMB/Server-message-block – uses legitimatePsExec+ stolen domain creds to copy itself to everyADMIN$share it can reach.
– No worm-style exploit (e.g., no EternalBlue) – infection is human-driven, so lateral movement is limited to where attackers already own credentials.
Remediation & Recovery Strategies:
1. Prevention
-
Proactive Measures:
– Harden RDP – disable if unused, otherwise enforce 2-FA/VPN-gateway, NLA, account lock-out, and 3389/Port-whitelisting.
– Segment & filter – VLAN isolated servers, restrict 445/135/139 between user LAN and critical assets, blockPsExecexecution for normal users via AppLocker.
– Patch & inventory – keep OS, 3rd-party apps, and remote-tools up to date; remove unused optional SMB1 feature completely (Win 7/2008 R2).
– Mail/Web filters – block macro docs, crack sites, and password-protected zips.
– Immutable backups – 3-2-1 rule (three copies, two media, one offline/off-site) plus periodic restore drills.
– EDR/NG-AV – behaviour-based protection is essential; signatures lag behind the dozens of weekly re-brands of this family.
2. Removal
- Infection Cleanup (high-level checklist):
- Isolate – yank the infected machine from the network or shut its Wi-Fi immediately.
-
Identify patient-zero – look for the log-in leading to creation of
C:\Users\<username>\AppData\Local\Temp\filename.tmp.exe(oftensvchost.exeorDuck.exe, hash changes daily). - Collect forensic image or at least dump RAM before first reboot if legal/operational capability exists.
-
Kill the malicious process and delete its persistence key (typically
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce). - Scan & scrub with a reputable AV/EDR engine, then run a second-opinion tool such as Malwarebytes, ESET, or MSERT.
- Reset all compromised credentials – local Administrator, domain accounts used for lateral movement, any cached service accounts.
- Re-image or clean-build the box, re-patch, restore data from offline backup and NOT from network shares the attacker touched.
3. File Decryption & Recovery
- Recovery Feasibility: Duck samples inspected so far use standard AES-256 in CBC mode for file data plus an RSA-2048 public key (embedded) to wrap the AES key. Private key is held only by the attacker—no flaw or leaked master key is currently known ⇒ decrypting without paying is impossible.
-
Essential Tools/Patches:
– Emsisoft, Bitdefender, Kaspersky, and No-More-Ransom have no working decryptor for Duck/Philis; any site claiming otherwise is fraudulent.
– Your single technical remedy is: restore from clean offline backup or shadow copies if they survived (vssadmin list shadows); Duck deletes them viavssadmin delete shadows /allin most modern samples, but older or failed runs occasionally leave them intact.
– Recovery software (PhotoRec, R-Studio, Recuva) can retrieve non-encrypted deleted originals only if the ransomware failed to wipe free space (not guaranteed).
– If you must consider paying: note that Duck e-mails you directly with a ProtonMail address and demands 0.01 BTC; payment compliance rate is low and victims report receiving nothing—so treat payment as high-risk / no-refund.
4. Other Critical Information
-
Additional Precautions / unique traits:
– Duck displays a plain grey pop-up titled “DuckDecryptor”; some builds also dropREADME_RESTORE.txtin every folder.
– It targets every logical drive letter (A: through Z:) but ignores files < 20 bytes and whitelists “.exe”, “.dll”, “.sys”, “.duck” to keep OS functional and avoid double-encryption.
– The family is frequently repacked; file hashes rotate weekly to evade AV, but network IOCs (same ransom note, same RSA modulus, same BTC wallet on a given campaign) remain consistent—monitor those to track outbreaks.
– Because Duck is not worm-capable, one compromised admin credential is the difference between one PC and the whole domain—focus incident response on password resets rather than emergency patching of MS17-010-type bugs.
Key Take-away: Duck is a re-skinned human-operated ransomware that lives or dies on stolen RDP / weak credentials; there is no free decryptor, so offline backups, credential hygiene, and RDP control are your only reliable defences.