Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Barak Ransomware consistently appends “.barak” (all lower-case) to every encrypted file. Example:
Document.docxbecomesDocument.docx.barak. - Renaming Convention: The malware normally keeps the original filename + original extension intact and simply concatenates “.barak” as a second extension. In recent samples the entire file path is also written in lower-case, but no additional identifier or campaign ID is inserted into the name.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First public appearance and submissions to ID-Ransomware / Any.Run were noted around mid-August 2023 (≈ 10–15 Aug 2023). Large spike in detections (especially hitting U.S. and LATAM mid-size businesses) was observed September-October 2023, following a wide-scale phishing wave.
3. Primary Attack Vectors
- Propagation Mechanisms:
- Phishing emails – ISO, ZIP, or IMG attachments containing a .NET loader with a double-extension lure (e.g., “Invoice.docx.exe”).
- RDP / VDI brute-force – Recommendations observed in the packets (port 3389) prior to lateral movement; passwords cracked via credential-stuffing lists.
- Malvertising & Fake Software Updates – Chromium-based browsers on out-of-date endpoints lured to fraudulent “Chrome Font Update” sites hosting the initial dropper.
- Smaller third-party supply-chain element – Two Managed Service Providers (MSPs) in Central Europe reported a Barak infection after a legitimate remote-support utility package was trojanised.
- Exploitation of known but still unpatched local privilege-escalation CVEs internally (e.g., Win32k EoP CVE-2021-1732, PrintSpooler CVE-2021-1675).
Remediation & Recovery Strategies:
1. Prevention
- Block or quarantine .iso, .img, .zip containing .exe-scr-com-js .lnk e-mail attachments at the mail-gateway.
- Enforce SMBv3-only (disable SMBv1/v2) and segment file-shares with least-privilege access.
- Apply Microsoft-CVE-stacks up-to-date; include Chromium, AnyDesk, or TeamViewer whenever present.
- Activate network-level authentication + account-lockout policy (10 attempts/5 min) for RDP endpoints.
- Restrict lateral movement: LAPS, PowerShell Constrained Language Mode, application allow-listing (Microsoft Defender ASR / AppLocker).
- End-user micro-drills: train staff to recognise “invoice” generics, HTML smuggling, and double-extensions.
2. Removal
- Physically isolate affected workstation(s) from network (pull cable / disable Wi-Fi).
- Boot into Safe Mode with Networking.
- Remove associated persistence:
- Registry run keys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run - Scheduled tasks:
BarakUpdaterorsysupdate.{random} - Services: “SysMainLog” or “WinsUpdate” (32-bit copy in
%APPDATA%\Microsoft\[random6]\)
- Execute an offline scan with updated Emsisoft Emergency Kit or Microsoft Defender Offline; it is signature-detected as Ransom:Win32/Barak.A!dha, Trojan-Ransom.Barak, or Win32/Filecoder.BR.
- Clean network shares: performs a recursive
del /q \\[share]\*.bakbefore encryption; check recycle-bin shadows to verify leftovers removed. - DO NOT reboot the device into normal mode until cleanup is finalized—it may attempt re-encryption from residual autoruns.
3. File Decryption & Recovery
-
Current Recovery Feasibility: NO public decryption tool exists. Barak utilizes Curve25519 + ChaCha20 with a per-machine ECDH private component stored only on the attacker’s servers. Offline key derivation at this time is not feasible.
-
Recommended fallback strategies:
-
Restore from clean, immutable/off-line backups (object-lock, tape, or air-gapped 3-2-1 scheme).
-
Review Volume Shadow Copies: Barak deletes most accessible shadow copies (
vssadmin delete shadows /all), but Volume Snapshots on Windows Server 2016+ (block-level with ReFS) can still be intact if the malware was blocked before completion. -
Use file-carving tools (PhotoRec or R-Studio) to recover deleted or overwritten smaller originals from HDDs with TRIM disabled; success rate <15 %.
-
Log correlation: the build ID inside the ransom note (see below) does sometimes match electronically submitted “leaked” keys in under-the-radar negotiation; if an organisation negotiates spear-phishing for decryptor delivery in 2024, share the 8-hex
BUILD-IDwith NoMoreRansom / reputable IR teams for scene-wide cluster-analysis. -
Essential Patches:
-
Microsoft Update KB5027231 (May 2023 cumulative) or later to mitigate the PPE vectors.
-
Chromium ≥ 119 to block the fake-updater chain.
-
AnyDesk ≥ 7.5, TeamViewer ≥ 11-15 to remove the exploited legacy D-Port open issues.
4. Other Critical Information
-
Unique Characteristics:
– Drops ransom note “README.barak.txt” in every directory alongside the wallpaper change (BMP) located in%TEMP%\wall.bmp.
– A “.id” file (JSON) written to%PROGRAMDATA%contains{"build":"A5D32ED4", "cid":"292"}—useful for tracking outbreak clusters.
– Selectively skips paths that contain"programdata\microsoft\windows\containers","tor browser", or"safari"reducing risk of system crash; however, system32 and bootmgr are encrypted if run under high privilege.
– Network drives mounted via WebDAV, Azure Files, or Synology NAS are enumerated aggressively (API depth-first scan). -
Broader Impact & Indicators:
– Primarily medium-business sectors accounting (~150 victims) with median ransom demand 2.5–3 BTC.
– Two latent Linux-based server intrusions were detected post-decryptor delivery; threat-actors leverage the same C2 pool (185.220.101.x, TOR hidden servicehsdirmnx4gm6ydmy[.]onion) suggesting double-extortion tactic loading StealBit in Linux.
– Elasticsearch indexes for network shares wiped during encryption phase, impacting DLP analytics uptime beyond the ransom demand.
End of report.