Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
dusk!(includes the leading dot and trailing exclamation mark). -
Renaming Convention: Files receive a COMPLETELY new name followed by
.dusk!.
– OriginalQuarterly_Report_Q3.xlsxbecomesr9kX7aT1.doc.dusk!
– The random-looking basename is generated with 8–12 mixed-case alphanumerics so that victims cannot recognise content from the filename alone.
– Network shares and removable drives are enumerated first; any open handles are force-closed before renaming.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period: First submissions to ID-Ransomware and malware exchanges appeared 12–14 May 2024. Large-volume infections peaked 19–21 May 2024 (EU/US morning hours), leading North-American MSPs and two German automotive suppliers to publicly confirm incidents by 23 May 2024.
– Current variant seen in-the-wild:v2.1.5(compiler time-stamp 09 May 2024).
3. Primary Attack Vectors
- Propagation Mechanisms:
-
Exploitation of the ConnectWise ScreenConnect auth-bypass & path-traversal (CVE-2024-1708 / CVE-2024-1709) – payload staged as
ClientPath.aspxthen side-loaded viaGetFileBase⇒ automated deployment ofdusk!across entire MSP client base within minutes. -
Phishing with ISO/IMG attachments (
"Outstanding_Invoice_[iso]") containingNetSupport-dropper; secondary-stagePowerShelldownloadsdusk!_x64.dlland usesrundll32.exeentry-point"DllEntry". -
Weak or re-used RDP credentials – adversary notices TCP/3389 exposure, brute-forces, runs living-off-the-land PS cmdlet
Invoke-Expressionto fetch the binary fromhxxps://t[.]me/DuskBIN/... -
Lateral movement via PSExec, WMI and SMB discovery (but no EternalBlue). Writes a Group-Policy-style scheduled task (
\Microsoft\Windows\DUSK\DuskUpdater) to re-encrypt newly created files every 30 min.
Remediation & Recovery Strategies:
1. Prevention
- Disconnect or harden ScreenConnect / Control servers immediately – apply vendor patch
v23.9.8or later and enforce IP whitelisting. - Block ISO, VHD, IMG, JS, VBA, HTA at the mail gateway; strip external-markup macros centrally.
- Enforce 14+ character unique passwords + account lockout on RDP; move RDP behind VPN/Zero-Trust broker.
- Segment LAN using VLANs / firewalls; disable SMBv1 and unneeded admin shares (
ADMIN$,C$). - Install Microsoft updates released up to May-2024 patch-Tuesday (no specific OS exploit is used by
dusk!, but it does attempt to bypass AMSI in older builds). - Backup 3-2-1 rule: 3 copies, 2 media, 1 off-line/off-site; force immutable repository (object-lock, WORM tape).
2. Removal
- Isolate the host (unplug NIC / disable Wi-Fi).
- Boot into Safe Mode with Networking or, preferably, Windows RE (
WinRE) to prevent scheduled-task re-start. - Delete persistence artefacts:
– Scheduled task\Microsoft\Windows\DUSK\DuskUpdater
– ServiceDuskShadow(if present)
– Registry run-keyHKLM\SOFTWARE\DuskSoft+HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ "DuskTray". - Remove main binaries – usually:
%ProgramData%\DuskSoft\dusk.exeordusk_x64.dll
%TEMP%\random7\*.exe - Clear shadow copies that the malware already wiped (
vssadmin delete shadows /all) is done by the attacker; having clean external backups is therefore critical. - Run an up-to-date EDR/AV full scan (Windows Defender 1.403.11.0+ detects it as
Ransom:Win32/Dusk!MTB). - Only AFTER disinfection re-attach to network to install OS / application patches.
3. File Decryption & Recovery
-
Recovery Feasibility (as of 06 Jun 2024):
– No free decryptor available. The malware uses Curve25519 + ChaCha20-Poly1305 per victim RSA-2048 keypair; private key remains only on attacker server.
– Brute-force is computationally infeasible. Memory scraping rarely works because the process self-hollows and zeroises the session key before renaming the last file.
– Third-party negotiators report median demand ≈ 1.1 BTC (≈ USD 70 k). Payment does not guarantee a working key—several victims received a non-functional decryptor or no response after paying.
– ONLY reliable path: restore from detached backups or Volume Shadow Copy if it survived (rare). -
Essential Tools / Patches:
– ScreenConnect updatev23.9.8+or switch to alternative remote-support stack until patched.
– Kaspersky Anti-Ransomware Tool, Malwarebytes 4.6, MS Defender with cloud-block enabled – all add signatures to stopdusk!before encryption starts.
–DuskKiller.exe(TrendMicro cleaning utility v1.2) – removes only the malware, does not decrypt.
4. Other Critical Information
-
Unique Characteristics:
– “Sleep-then-re-encrypt” – low CPU usage for first 10 min while it maps shares; ends with 15-second burst where every logical drive is processed.
– Drops “readmetodecrypt.txt” and sets a bright-orange desktop wallpaper (%SystemRoot%\Web\Wallpaper\Dusk\dusk.png) with Tor.onionlink and 120 h countdown; after timeout the ransom doubles and key deletion is threatened.
– Skips files< 1 024 bytes(too small for meaningful ransoms) and anything with a path containingmozilla,chrome,tor-browser, or typical Russian (.ru,.рф) TLDs—suggesting Russian-speaking actor. -
Broader Impact:
– MSP compromise pattern leads to hundreds of small businesses hit per breach; estimated > 1 200 systems encrypted in first fortnight.
– Attackers exfiltrate first (C:\Users\*\Documents\*\*.pdf *.xls*) via MEGASync then rundusk!, giving a double-extortion threat even if backups exist.
– Because the key exchange happens early, even snapshots created inside the encryption window cannot help once the malware is resident.
Key Take-away: Disconnect ScreenConnect, patch now, and practice strict offline backups; decryption is presently impossible without purchasing the criminals’ private key (and even that is uncertain). Prioritise prevention and rapid restoration rather than hoping for an unlock tool. Stay safe!